[tip:,x86/core] x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG
Message ID | 169098679602.28540.7005603884356771970.tip-bot2@tip-bot2 |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9f41:0:b0:3e4:2afc:c1 with SMTP id v1csp550552vqx; Wed, 2 Aug 2023 08:48:35 -0700 (PDT) X-Google-Smtp-Source: APBJJlHvSVg/e8GvXoYfa5SH99kVqxRwRcVY9Pv9WHeuV0Rt6ZOW7Gt9HOcuEownJPrDXmcc/RTw X-Received: by 2002:a17:902:76cc:b0:1bc:e6a:2059 with SMTP id j12-20020a17090276cc00b001bc0e6a2059mr6960435plt.26.1690991314898; Wed, 02 Aug 2023 08:48:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690991314; cv=none; d=google.com; s=arc-20160816; b=s80+r+186CpEjyhxz2LuFQXDVhkLILzYoImjSgmj80RRykwORlEx1ylZAb7cFEIceg RlYonxPSoeEXZ251a9bwmc2my/gw0wgb0HjGrXh/enymQNcBd6nbgtKO6z0ZmKaFeGlh tEw6hEZF/HrDti18TAgd9Mi8nkAbGa2HFdNzS8OW3/x+kqoOopg4FuqCE5kHDWUkr5FX lTVudB00OTXJrKeqmfJ4p5Pbwrr6xVTy36Cpv5TBn6rNTb/lTgDsgrb3uSSPjK8Qh0Yv 7kml/5EJnIzGi+ryU1vGZLM3ZCZTOx5xCHGoowcJszgv78B1+uG3JzsTlkxUxiETRIA7 wnzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=iBsgB1YLGfdl/SuhRbFuHsRmPl5vqrv9c+Xp2VGeIns=; fh=MWxlNZsqKOZay4lqG2IosM3VQOBDas3F2EcMfbwebEQ=; b=dym0zlAyVOrRlb3LRqVVXlzbnEs1dLFQxZPxJqjRgmq6KU+qNGaWjTQqnwUub7FWlc 35IqErTdtwg7AGWEPFLdYG12t1TMjD3d15pZfiw2YuDhKWAjpS8SwFBA1kXt14b0uZei bDoADtVACq3U93JZ7KvLlQtqeDx2DIjAt0VMFVO9cDfcvaZej3UjhouEtAG1qycZts28 rpDcAEUAt6cto/gsiML9yeX9TJiDRG1siuA8ydNAYOEU93z3c1PCilHp++GvDcf7aT+c qaqaEkKfr5zHfSjp4G7ENptw8ZpHQcWbQAOx6v+YODY8P1Y9rcuaEesIhMVAunTyM1P1 1Uqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=YO9grGOi; dkim=neutral (no key) header.i=@linutronix.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j14-20020a170902da8e00b001bb7b0d358bsi2618498plx.272.2023.08.02.08.48.20; Wed, 02 Aug 2023 08:48:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=YO9grGOi; dkim=neutral (no key) header.i=@linutronix.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233766AbjHBOdV (ORCPT <rfc822;maxi.paulin@gmail.com> + 99 others); Wed, 2 Aug 2023 10:33:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36174 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231795AbjHBOdU (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 2 Aug 2023 10:33:20 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 677221723; Wed, 2 Aug 2023 07:33:18 -0700 (PDT) Date: Wed, 02 Aug 2023 14:33:16 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1690986796; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iBsgB1YLGfdl/SuhRbFuHsRmPl5vqrv9c+Xp2VGeIns=; b=YO9grGOi6dMO5re7MmmMEkWvlIcKpXTNPZRXY9A1EJKHFhqPGRtwgveF6hX7elLOtSLdL2 8qMih6NwA8uJg0FlHlaAZwswAQfS5j+BkPc7JBHWZEATmA0ZYrg/+jTRRvTcNHTI46sUy0 JJsMH8Hb3kg0hexYTt4yL0+lwl68xhXqAScVmE568OAdhlRpvKRTSI+c3mknty4JoypMk8 vCWsAEXZLDFFgukEXfdue8rIw6aEMd4cG1SuZoskB9L+JSGLeYCbjDhjF2LeqkeIr1VST/ cRM62+zDMTugwM61R88rKorxau6OLHGb/m2VH4k3t/8MstDhHEN7quL+cX+4yA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1690986796; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iBsgB1YLGfdl/SuhRbFuHsRmPl5vqrv9c+Xp2VGeIns=; b=uRe1hDAh9TJSm1ycOqyQBOKXTb8CnsvlijTKGrq30Qox39Rwa7gCXALXKPLe65B7PJ6/iL +and02IxgK0+6jDw== From: "tip-bot2 for Petr Pavlu" <tip-bot2@linutronix.de> Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/core] x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG Cc: Petr Pavlu <petr.pavlu@suse.com>, "Peter Zijlstra (Intel)" <peterz@infradead.org>, x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20230711091952.27944-2-petr.pavlu@suse.com> References: <20230711091952.27944-2-petr.pavlu@suse.com> MIME-Version: 1.0 Message-ID: <169098679602.28540.7005603884356771970.tip-bot2@tip-bot2> Robot-ID: <tip-bot2@linutronix.de> Robot-Unsubscribe: Contact <mailto:tglx@linutronix.de> to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1771116661811027902 X-GMAIL-MSGID: 1773132908740179605 |
Series |
[tip:,x86/core] x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG
|
|
Commit Message
tip-bot2 for Thomas Gleixner
Aug. 2, 2023, 2:33 p.m. UTC
The following commit has been merged into the x86/core branch of tip: Commit-ID: 973ab2d61f33dc85212c486e624af348c4eeb5c9 Gitweb: https://git.kernel.org/tip/973ab2d61f33dc85212c486e624af348c4eeb5c9 Author: Petr Pavlu <petr.pavlu@suse.com> AuthorDate: Tue, 11 Jul 2023 11:19:51 +02:00 Committer: Peter Zijlstra <peterz@infradead.org> CommitterDate: Wed, 02 Aug 2023 16:27:07 +02:00 x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG Linker script arch/x86/kernel/vmlinux.lds.S matches the thunk sections ".text.__x86.*" from arch/x86/lib/retpoline.S as follows: .text { [...] TEXT_TEXT [...] __indirect_thunk_start = .; *(.text.__x86.*) __indirect_thunk_end = .; [...] } Macro TEXT_TEXT references TEXT_MAIN which normally expands to only ".text". However, with CONFIG_LTO_CLANG, TEXT_MAIN becomes ".text .text.[0-9a-zA-Z_]*" which wrongly matches also the thunk sections. The output layout is then different than expected. For instance, the currently defined range [__indirect_thunk_start, __indirect_thunk_end] becomes empty. Prevent the problem by using ".." as the first separator, for example, ".text..__x86.indirect_thunk". This pattern is utilized by other explicit section names which start with one of the standard prefixes, such as ".text" or ".data", and that need to be individually selected in the linker script. Fixes: dc5723b02e52 ("kbuild: add support for Clang LTO") Signed-off-by: Petr Pavlu <petr.pavlu@suse.com> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lore.kernel.org/r/20230711091952.27944-2-petr.pavlu@suse.com --- arch/x86/kernel/vmlinux.lds.S | 2 +- arch/x86/lib/retpoline.S | 4 ++-- tools/objtool/check.c | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-)
Comments
On Wed, Aug 02, 2023 at 02:33:16PM -0000, tip-bot2 for Petr Pavlu wrote: > The following commit has been merged into the x86/core branch of tip: > > Commit-ID: 973ab2d61f33dc85212c486e624af348c4eeb5c9 > Gitweb: https://git.kernel.org/tip/973ab2d61f33dc85212c486e624af348c4eeb5c9 > Author: Petr Pavlu <petr.pavlu@suse.com> > AuthorDate: Tue, 11 Jul 2023 11:19:51 +02:00 > Committer: Peter Zijlstra <peterz@infradead.org> > CommitterDate: Wed, 02 Aug 2023 16:27:07 +02:00 > > x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG > [...] > --- a/tools/objtool/check.c > +++ b/tools/objtool/check.c > @@ -389,7 +389,7 @@ static int decode_instructions(struct objtool_file *file) > if (!strcmp(sec->name, ".noinstr.text") || > !strcmp(sec->name, ".entry.text") || > !strcmp(sec->name, ".cpuidle.text") || > - !strncmp(sec->name, ".text.__x86.", 12)) > + !strncmp(sec->name, ".text..__x86.", 12)) Andy Cooper reported this should be 13.
On Fri, Aug 04, 2023 at 12:03:23AM +0100, Andrew Cooper wrote: > Lets hope there are no .text..__x86womble sections around. > > Fixes: 973ab2d61f33 ("x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG") > Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> > --- > CC: Petr Pavlu <petr.pavlu@suse.com> > CC: Peter Zijlstra (Intel) <peterz@infradead.org> > CC: Josh Poimboeuf <jpoimboe@kernel.org> > CC: linux-kernel@vger.kernel.org > > Alternatively, > > int strstarts(const char *s1, const char *s2) > { > return strncmp(s1, s2, strlen(s2)); > } Durr, I hate C ;-/ And yes, we have a ton of it, lemme try that strstarts thing.
On Fri, Aug 04, 2023 at 10:28:53AM +0200, Peter Zijlstra wrote: > On Fri, Aug 04, 2023 at 12:03:23AM +0100, Andrew Cooper wrote: > > Lets hope there are no .text..__x86womble sections around. > > > > Fixes: 973ab2d61f33 ("x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG") > > Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> > > --- > > CC: Petr Pavlu <petr.pavlu@suse.com> > > CC: Peter Zijlstra (Intel) <peterz@infradead.org> > > CC: Josh Poimboeuf <jpoimboe@kernel.org> > > CC: linux-kernel@vger.kernel.org > > > > Alternatively, > > > > int strstarts(const char *s1, const char *s2) > > { > > return strncmp(s1, s2, strlen(s2)); > > } > > Durr, I hate C ;-/ And yes, we have a ton of it, lemme try that > strstarts thing. So there, that builds and compiles a kernel, must be good :-) Now, let me go make some wake-up juice ... --- tools/objtool/check.c | 31 +++++++++++++++---------------- 1 file changed, 15 insertions(+), 16 deletions(-) diff --git a/tools/objtool/check.c b/tools/objtool/check.c index e096eb325acd..a2b624b580ff 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -20,6 +20,7 @@ #include <linux/hashtable.h> #include <linux/kernel.h> #include <linux/static_call_types.h> +#include <linux/string.h> struct alternative { struct alternative *next; @@ -383,13 +384,13 @@ static int decode_instructions(struct objtool_file *file) if (strcmp(sec->name, ".altinstr_replacement") && strcmp(sec->name, ".altinstr_aux") && - strncmp(sec->name, ".discard.", 9)) + !strstarts(sec->name, ".discard.")) sec->text = true; if (!strcmp(sec->name, ".noinstr.text") || !strcmp(sec->name, ".entry.text") || !strcmp(sec->name, ".cpuidle.text") || - !strncmp(sec->name, ".text..__x86.", 12)) + strstarts(sec->name, ".text..__x86.")) sec->noinstr = true; /* @@ -709,8 +710,7 @@ static int create_static_call_sections(struct objtool_file *file) perror("strdup"); return -1; } - if (strncmp(key_name, STATIC_CALL_TRAMP_PREFIX_STR, - STATIC_CALL_TRAMP_PREFIX_LEN)) { + if (!strstarts(key_name, STATIC_CALL_TRAMP_PREFIX_STR)) { WARN("static_call: trampoline name malformed: %s", key_name); free(key_name); return -1; @@ -900,7 +900,7 @@ static int create_cfi_sections(struct objtool_file *file) if (sym->type != STT_FUNC) continue; - if (strncmp(sym->name, "__cfi_", 6)) + if (!strstarts(sym->name, "__cfi_")) continue; idx++; @@ -916,7 +916,7 @@ static int create_cfi_sections(struct objtool_file *file) if (sym->type != STT_FUNC) continue; - if (strncmp(sym->name, "__cfi_", 6)) + if (!strstarts(sym->name, "__cfi_")) continue; if (!elf_init_reloc_text_sym(file->elf, sec, @@ -2468,7 +2468,7 @@ static bool is_profiling_func(const char *name) /* * Many compilers cannot disable KCOV with a function attribute. */ - if (!strncmp(name, "__sanitizer_cov_", 16)) + if (strstarts(name, "__sanitizer_cov_")) return true; /* @@ -2477,7 +2477,7 @@ static bool is_profiling_func(const char *name) * the __no_sanitize_thread attribute, remove them. Once the kernel's * minimum Clang version is 14.0, this can be removed. */ - if (!strncmp(name, "__tsan_func_", 12) || + if (strstarts(name, "__tsan_func_") || !strcmp(name, "__tsan_atomic_signal_fence")) return true; @@ -2492,8 +2492,7 @@ static int classify_symbols(struct objtool_file *file) if (func->bind != STB_GLOBAL) continue; - if (!strncmp(func->name, STATIC_CALL_TRAMP_PREFIX_STR, - strlen(STATIC_CALL_TRAMP_PREFIX_STR))) + if (strstarts(func->name, STATIC_CALL_TRAMP_PREFIX_STR)) func->static_call_tramp = true; if (arch_is_retpoline(func)) @@ -2528,7 +2527,7 @@ static void mark_rodata(struct objtool_file *file) * .rodata.str1.* sections are ignored; they don't contain jump tables. */ for_each_sec(file, sec) { - if (!strncmp(sec->name, ".rodata", 7) && + if (strstarts(sec->name, ".rodata") && !strstr(sec->name, ".str1.")) { sec->rodata = true; found = true; @@ -3400,7 +3399,7 @@ static inline bool noinstr_call_dest(struct objtool_file *file, * something 'BAD' happened. At the risk of taking the machine down, * let them proceed to get the message out. */ - if (!strncmp(func->name, "__ubsan_handle_", 15)) + if (strstarts(func->name, "__ubsan_handle_")) return true; return false; @@ -3531,8 +3530,8 @@ static int validate_branch(struct objtool_file *file, struct symbol *func, if (func && insn_func(insn) && func != insn_func(insn)->pfunc) { /* Ignore KCFI type preambles, which always fall through */ - if (!strncmp(func->name, "__cfi_", 6) || - !strncmp(func->name, "__pfx_", 6)) + if (strstarts(func->name, "__cfi_") || + strstarts(func->name, "__pfx_")) return 0; WARN("%s() falls through to next function %s()", @@ -4401,9 +4400,9 @@ static int validate_ibt(struct objtool_file *file) * These sections can reference text addresses, but not with * the intent to indirect branch to them. */ - if ((!strncmp(sec->name, ".discard", 8) && + if ((strstarts(sec->name, ".discard") && strcmp(sec->name, ".discard.ibt_endbr_noseal")) || - !strncmp(sec->name, ".debug", 6) || + strstarts(sec->name, ".debug") || !strcmp(sec->name, ".altinstructions") || !strcmp(sec->name, ".ibt_endbr_seal") || !strcmp(sec->name, ".orc_unwind_ip") ||
On Fri, Aug 04, 2023 at 10:43:28AM +0200, Peter Zijlstra wrote: > On Fri, Aug 04, 2023 at 10:28:53AM +0200, Peter Zijlstra wrote: > > On Fri, Aug 04, 2023 at 12:03:23AM +0100, Andrew Cooper wrote: > > > Alternatively, > > > > > > int strstarts(const char *s1, const char *s2) > > > { > > > return strncmp(s1, s2, strlen(s2)); > > > } > > > > Durr, I hate C ;-/ And yes, we have a ton of it, lemme try that > > strstarts thing. > > So there, that builds and compiles a kernel, must be good :-) Would be nice to see this strstarts() change go in ;-) Acked-by: Josh Poimboeuf <jpoimboe@kernel.org>
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S index 03c885d..a4cd04c 100644 --- a/arch/x86/kernel/vmlinux.lds.S +++ b/arch/x86/kernel/vmlinux.lds.S @@ -134,7 +134,7 @@ SECTIONS SOFTIRQENTRY_TEXT #ifdef CONFIG_RETPOLINE __indirect_thunk_start = .; - *(.text.__x86.*) + *(.text..__x86.*) __indirect_thunk_end = .; #endif STATIC_CALL_TEXT diff --git a/arch/x86/lib/retpoline.S b/arch/x86/lib/retpoline.S index 3fd066d..3bea963 100644 --- a/arch/x86/lib/retpoline.S +++ b/arch/x86/lib/retpoline.S @@ -12,7 +12,7 @@ #include <asm/percpu.h> #include <asm/frame.h> - .section .text.__x86.indirect_thunk + .section .text..__x86.indirect_thunk .macro POLINE reg @@ -131,7 +131,7 @@ SYM_CODE_END(__x86_indirect_jump_thunk_array) */ #ifdef CONFIG_RETHUNK - .section .text.__x86.return_thunk + .section .text..__x86.return_thunk /* * Safety details here pertain to the AMD Zen{1,2} microarchitecture: diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 8936a05..e096eb3 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -389,7 +389,7 @@ static int decode_instructions(struct objtool_file *file) if (!strcmp(sec->name, ".noinstr.text") || !strcmp(sec->name, ".entry.text") || !strcmp(sec->name, ".cpuidle.text") || - !strncmp(sec->name, ".text.__x86.", 12)) + !strncmp(sec->name, ".text..__x86.", 12)) sec->noinstr = true; /*