Received: by 2002:a05:7412:bbc7:b0:fc:a2b0:25d7 with SMTP id kh7csp42891rdb; Thu, 1 Feb 2024 01:11:35 -0800 (PST) X-Google-Smtp-Source: AGHT+IF1Q/wS9H0ZxHghge3Rl6O3Dzqc848pTy+MPZWYi15d3q9+ehp5Vu20b6Yyy77c2OSli1qV X-Received: by 2002:aa7:84c5:0:b0:6dd:db87:1947 with SMTP id x5-20020aa784c5000000b006dddb871947mr3815102pfn.3.1706778695204; Thu, 01 Feb 2024 01:11:35 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706778695; cv=pass; d=google.com; s=arc-20160816; b=UUG3ne2Zsfypx5GlocspHkrCdw9ZedU+V4lg6+Yjim9Q72q8KfWZSr4csOJgNQtZU2 95JWu3bIGbywAH3MBZtuLEKS3XlXjJoSDp7+6oLhp3SpSpA0xhH0Kk+c7+F4wYLKEekg nrkH8F8/X6nrKTpAupYNgV+VdaXpd86Y3jbqzYkvrgSewnsE+ocoBeb/smIcv2+D4CXq c9XMdLjI8nc4RXYUbI38dJmqWlHTkjmcdYJr3ZlpnUpLuysU/js/JQ77v/9SuO+d+5El fxPXuiL/IlJ6LjzrhZJXhFpVa+Dy2tCNcdbNhwx6lUIDX7taTgaIIk9a7AlSAsFerU5h g1hQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=zpmw7XD3NRYPmylcKUZIs1amCALm5ceYEkOK13mCobY=; fh=RnR8IkThCzQ//EbSAzlLeoLuMefF+AzAzZbTu91kF+8=; b=Pe34dfBJRbfjXUKZ5YmTbqc7/RQ3AOrVMHo5/6Ijto5OBzBNV0QjnGsmjZGvyNSQsw YYThp1uHT5p1awScI8XT+4hwuO1Qazd2u549/QIpXe5UuYakouRQBDWywEcV0lXBeAeH Z1cw2yMTHSLxcRden5H1ilTPyuHsCyKOrhPjkoHEV/4cd+GUz3bHsBeiXkmbSpbsbpU6 leaXg0VRVmFNq8atG2+n+5EiS9yg17un/vyfHaHyzxy73mDAJBii+bdLXpmYl1qlEhcE GXd6EYJC9P//GnIRJTAp/aPNznWst+WrngBBNdi/4wd6shs2HU5h81ridS6sHu6yo89B exGA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=eDpI9gMa; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-47831-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-47831-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com X-Forwarded-Encrypted: i=1; AJvYcCUZj1bE6VaWJi5ixX+M7/qzpBZgMKvD3yTzQmnrDn87xNKwbmlouL9lscRdEYbdsx7D5rrXfolM1vc10J7wECL8dEhbE0atrEZEKrn84A== Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id k1-20020aa788c1000000b006de3b4d5865si6427269pff.157.2024.02.01.01.11.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Feb 2024 01:11:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-47831-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=eDpI9gMa; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-47831-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-47831-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id D3690287CEE for ; Thu, 1 Feb 2024 09:11:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C4B4D15AAD1; Thu, 1 Feb 2024 09:11:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="eDpI9gMa" Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com [209.85.214.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1372C15AAB8 for ; Thu, 1 Feb 2024 09:11:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.170 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706778688; cv=none; b=KzTkZObXl8OkqE7vf+uIifHFzC8yXtMkFCZPx4ezDYnvKnD/nXRUBjHhOSR8BH5r13ibDrwNjWmHMJbXr4tDA30ccn6XeFzu+DkGKYOalmysQbI/nemeAjLwP5JFWAFNdXarkdtMoFluA3ZL2VbcJyqBxVq3KpmC09lqlTaAYJU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706778688; c=relaxed/simple; bh=z5l8pCabst69rv4xapMz3C1Qz+VTsygJd1zMO6dlE20=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=OhgWdIr1z/DExlms7sjuQAe83Cmc0admFLi396+wTFbKhEfABZFwO92uJbltC5G7vs848ra0Hrql4dO1nxvCgdvPlReRgYPuM62QV6xB9erawomAdH9OKjsd3BrNx7gggFX1d1WIhxwG7NnbX23Ck+9Bh0g33BnZPJhPxPlM+ro= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=eDpI9gMa; arc=none smtp.client-ip=209.85.214.170 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=google.com Received: by mail-pl1-f170.google.com with SMTP id d9443c01a7336-1d5ce88b51cso157545ad.0 for ; Thu, 01 Feb 2024 01:11:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1706778685; x=1707383485; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=zpmw7XD3NRYPmylcKUZIs1amCALm5ceYEkOK13mCobY=; b=eDpI9gMadbGGvzo1fOKyWYsPBz/Bq2mo6kjHfgYy3fobB6unA2rrDkkQ0NPBe956bq pF/xDz1E58KQKE61pgtTLkDTl2PgzLvS3qrFbkK7qD1eDfk79BPaZBCUEX/TwTjcuBVl corRRK8updLZkLUj4Ozy81g5XLHqFn3V1CrL6BcjQXyd5Mb3G5OxUKaBKI/Z/eND3ce8 5REvbsA2wHk4bjj9dBRTr53oTRGyuH1f39d/f2Tg/JUxvrcQc21NZ6rzYenzau9sMNJw U01ZiBYKAQ6m1WzYx5yQLoijZex9Dok5UTnsaMw1NGK7LGZEbkJcbSWliXlClUS/lfJ1 LEDQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706778685; x=1707383485; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=zpmw7XD3NRYPmylcKUZIs1amCALm5ceYEkOK13mCobY=; b=GG+vG7+WMpf0N4RmJG+04/CiB35UqCKHjuJ7wJggF1xp3jcG44YJrA+0+3VQkAJnwN IrO70N+IuLZCNfQ2702wlyqTwFqpJsMnzHsG2xRoPlgSUtZGHBRQCmGeuuH2Sr0AJ2I3 PnuZ1SvWAMhEg/vj5Wk9TkwPPu2JRcPwUUsxByknf9Q1SrlRQyydSTbnvqBtfp6JJ05g Rz8/rT3ljCUN0u6toDFGs3er3AJEVPXrnCNsZKDLrcGScrUWvhG8xAENWTNBN5rqEz+R H/d7HEMr6oR/1iy/oZFsZYkiUoboT7F0WaUAcr4hUMkQUtkjBR0gK57om5REkWADFywh zVbQ== X-Gm-Message-State: AOJu0YyibMM2qEm1+0VVjCx8bGcxRwIL51h59PxSmBoxcm4YXxRp+LTr ZSenkGV70La6rmyGCBOMB6HjqWBkDImnPFSy3erHuEA7QMfNg2MoXraZSjYeAQ== X-Received: by 2002:a17:902:ced1:b0:1d6:fb94:10d5 with SMTP id d17-20020a170902ced100b001d6fb9410d5mr139335plg.27.1706778685070; Thu, 01 Feb 2024 01:11:25 -0800 (PST) X-Forwarded-Encrypted: i=0; AJvYcCUrBRGPWguQv+hECDS45pjyaIr8WcoLrgzXUAgcAytmPpZrNB491a1QBS8h6aAZtuUn0nByGer8flJ9jGXMckawcVjlKBMKWkP/CQpCfPU9xE5+qGj1oxLnTwf3K9wBlb5C6+D0K4nlMvIduKOvkPEjfmy/qA0REshrupZR5iibOO+gT0i33Gy/1yGXoCHXhv3UXQFLpzG7gsZP0Y+8ikQ+P/9gGmfcQXi/Xjd7Ui8FQ6YEpJH1sSHbuUj3x1lssAJEKVcRw4pLQS07A0zf805ludaBv+JjRJxZvpY= Received: from google.com ([2620:15c:2d3:205:ce95:ce9d:3dd2:5053]) by smtp.gmail.com with ESMTPSA id l20-20020a170902e2d400b001d8d04a4fa8sm7699490plc.300.2024.02.01.01.11.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Feb 2024 01:11:24 -0800 (PST) Date: Thu, 1 Feb 2024 01:11:20 -0800 From: Fangrui Song To: Ard Biesheuvel Cc: Dave Martin , Peter Smith , Catalin Marinas , Will Deacon , linux-arm-kernel@lists.infradead.org, Jisheng Zhang , llvm@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [PATCH] arm64: jump_label: use constraint "S" instead of "i" Message-ID: <20240201091120.pbgr7ng6t2c36fut@google.com> References: <20240131065322.1126831-1-maskray@google.com> <20240201045551.ajg4iqcajyowl2rh@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: On 2024-02-01, Ard Biesheuvel wrote: >On Thu, 1 Feb 2024 at 05:55, Fangrui Song wrote: >> >> On 2024-01-31, Dave Martin wrote: >> >On Wed, Jan 31, 2024 at 08:16:04AM +0100, Ard Biesheuvel wrote: >> >> Hello Fangrui, >> >> >> >> On Wed, 31 Jan 2024 at 07:53, Fangrui Song wrote: >> >> > >> >> > The constraint "i" seems to be copied from x86 (and with a redundant >> >> > modifier "c"). It works with -fno-PIE but not with -fPIE/-fPIC in GCC's >> >> > aarch64 port. >> > >> >(I'm not sure of the exact history, but the "c" may be inherited from >> >arm, where an output modifier was needed to suppress the "#" that >> >prefixes immediates in the traditional asm syntax. This does not >> >actually seem to be required for AArch64: rather while a # is allowed >> >and still considered good style in handwritten asm code, the syntax >> >doesn't require it, and the compiler doesn't emit it for "i" arguments, >> >AFAICT.) >> >> The aarch64 one could be inherited from >> arch/arm/include/asm/jump_label.h (2012), which could in turn be >> inherited from x86 (2010). >> Both the constraint "i" and the modifier "c" are generic.. >> For -fno-pic this combination can be used for every arch. >> >> >> > The constraint "S", which denotes a symbol reference (e.g. function, >> >> > global variable) or label reference, is more appropriate, and has been >> >> > available in GCC since 2012 and in Clang since 7.0. >> >> > >> >> > Signed-off-by: Fangrui Song >> >> > Link: https://maskray.me/blog/2024-01-30-raw-symbol-names-in-inline-assembly >> >> > --- >> >> > arch/arm64/include/asm/jump_label.h | 8 ++++---- >> >> > 1 file changed, 4 insertions(+), 4 deletions(-) >> >> > >> >> > diff --git a/arch/arm64/include/asm/jump_label.h b/arch/arm64/include/asm/jump_label.h >> >> > index 48ddc0f45d22..31862b3bb33d 100644 >> >> > --- a/arch/arm64/include/asm/jump_label.h >> >> > +++ b/arch/arm64/include/asm/jump_label.h >> >> > @@ -23,9 +23,9 @@ static __always_inline bool arch_static_branch(struct static_key * const key, >> >> > " .pushsection __jump_table, \"aw\" \n\t" >> >> > " .align 3 \n\t" >> >> > " .long 1b - ., %l[l_yes] - . \n\t" >> >> > - " .quad %c0 - . \n\t" >> >> > + " .quad %0 - . \n\t" >> >> > " .popsection \n\t" >> >> > - : : "i"(&((char *)key)[branch]) : : l_yes); >> >> > + : : "S"(&((char *)key)[branch]) : : l_yes); >> >> >> >> 'key' is not used as a raw symbol name. We should make this >> >> >> >> " .quad %0 + %1 - ." >> >> >> >> and >> >> >> >> :: "S"(key), "i"(branch) :: l_yes); >> >> >> >> if we want to really clean this up. >> > >> >This hides more logic in the asm so it's arguably more cryptic >> >(although the code is fairly cryptic to begin with -- I don't really >> >see why the argument wasn't written as the equivalent >> >(char *)key + branch...) >> >> I agree that using "S" and "i" would introduce complexity. >> Using just "S" as this patch does should be clear. >> >> All of "i" "s" "S" support a symbol or label reference and a constant offset (can be zero), >> (in object file, a symbol and an addend; in GCC's term, the sum of a SYMBOL_REF and a CONST_INT). >> > >Taken the address of a struct, cast it to char[] and then index it >using a boolean is rather disgusting, no? I agree with you. Hmm. Clang's constraint "S" implementation doesn't support a constant offset, so `static_key_false(&nf_hooks_needed[pf][hook])` in include/linux/netfilter.h:nf_hook would not compile with Clang <= 18. I have a patch https://github.com/llvm/llvm-project/pull/80255 , but even if it is accepted and cherry-picked into the 18.x release branch, if we still support older Clang, we cannot use "S" unconditionally. So we probably need the following to prepare for -fPIE support in the future: diff --git a/arch/arm64/include/asm/jump_label.h b/arch/arm64/include/asm/jump_label.h index 48ddc0f45d22..b8af2f8b0c99 100644 --- a/arch/arm64/include/asm/jump_label.h +++ b/arch/arm64/include/asm/jump_label.h @@ -15,6 +15,16 @@ #define JUMP_LABEL_NOP_SIZE AARCH64_INSN_SIZE +/* + * Prefer "S" to support PIC. However, use "i" for Clang 18 and earlier as "S" + * on a symbol with a constant offset is not supported. + */ +#if defined(CONFIG_CC_IS_CLANG) && __clang_major__ <= 18 +#define JUMP_LABEL_STATIC_KEY_CONSTRAINT "i" +#else +#define JUMP_LABEL_STATIC_KEY_CONSTRAINT "S" +#endif + static __always_inline bool arch_static_branch(struct static_key * const key, const bool branch) { @@ -23,9 +33,9 @@ static __always_inline bool arch_static_branch(struct static_key * const key, " .pushsection __jump_table, \"aw\" \n\t" " .align 3 \n\t" " .long 1b - ., %l[l_yes] - . \n\t" - " .quad %c0 - . \n\t" + " .quad %0 + %1 - . \n\t" " .popsection \n\t" - : : "i"(&((char *)key)[branch]) : : l_yes); + : : JUMP_LABEL_STATIC_KEY_CONSTRAINT(key), "i"(branch) : : l_yes); return false; l_yes: @@ -40,9 +50,9 @@ static __always_inline bool arch_static_branch_jump(struct static_key * const ke " .pushsection __jump_table, \"aw\" \n\t" " .align 3 \n\t" " .long 1b - ., %l[l_yes] - . \n\t" - " .quad %c0 - . \n\t" + " .quad %0 + %1 - . \n\t" " .popsection \n\t" - : : "i"(&((char *)key)[branch]) : : l_yes); + : : JUMP_LABEL_STATIC_KEY_CONSTRAINT(key), "i"(branch) : : l_yes); return false; l_yes: >> >Anyway, I don't think the "i" versys "S" distinction makes any >> >difference without -fpic or equivalent, so it is not really relevant >> >for the kernel (except that "S" breaks compatibility with older >> >compilers...) >> > >> > >> >I think the main advantage of "S" is that it stops you accidentally >> >emitting undesirable relocations from asm code that is not written for >> >the -fpic case. >> > >> >But just changing "i" to "S" is not sufficient to port asms to -fpic: >> >the asms still need to be reviewed. >> > >> > >> >So unless the asm has been reviewed for position-independence, it may >> >anyway be better to stick with "i" so that the compiler actually chokes >> >if someone tries to build the code with -fpic. >> > >The virtual address of the kernel is randomized by KASLR, which relies >on PIE linking, and this puts constraints on the permitted types of >relocations. > >IOW, we basically already build the kernel as PIC code, but without >relying on -fPIC, because that triggers some behaviors that only make >sense for shared objects in user space. > >> >Since we are not trying to run arbitraily many running kernels in a >> >common address space (and not likely to do that), I'm not sure that we >> >would ever build the kernel with -fpic except for a few special-case >> >bits like the EFI stub and vDSO... unless I've missed something? >> > > >Yes, KASLR. The number of kernels is not the point, the point is that >the virtual load address of the kernel is usually decided at boot, and >so the code needs to be generated to accommodate that. > >> >If there's another reason why "S" is advantageous though, I'm happy to >> >be corrected. >> >> I remember that Ard has an RFC >> https://lore.kernel.org/linux-arm-kernel/20220427171241.2426592-1-ardb@kernel.org/ >> "[RFC PATCH 0/2] arm64: use PIE code generation for KASLR kernel" >> and see some recent PIE codegen patches. >> >> > Building the KASLR kernel without -fpie but linking it with -pie works >> > in practice, but it is not something that is explicitly supported by the >> > toolchains - it happens to work because the default 'small' code model >> > used by both GCC and Clang relies mostly on ADRP+ADD/LDR to generate >> > symbol references. >> >> I agree that current -fno-PIE with -shared -Bsymbolic linking is a hack >> that works as a conincidence, not guaranteed by the toolchain. >> This jump_label improvement (with no object file difference) fixes an >> obstacle. > >If we can get the guaranteed behavior of #pragma GCC visibility >push(hidden) from a command line option, we should build the core >kernel with -fpie instead. (Modules are partially linked objects, so >they can be built non-PIC as before) > I believe we don't have such a GCC option, but the effect can be simulated by -include hidden.h ...