Message ID | cover.1699016830.git.szabolcs.nagy@arm.com |
---|---|
Headers |
Return-Path: <binutils-bounces+ouuuleilei=gmail.com@sourceware.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:8f47:0:b0:403:3b70:6f57 with SMTP id j7csp1022587vqu; Fri, 3 Nov 2023 06:15:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFZGKIzspREJnYlppVh3GJI3y2w3JzLtX/JfR4MuOtM1Nj2k/4KZ1sAvAPfS6JJOheRQUBJ X-Received: by 2002:a67:cb8d:0:b0:45d:a27a:7e8c with SMTP id h13-20020a67cb8d000000b0045da27a7e8cmr734275vsl.23.1699017357708; Fri, 03 Nov 2023 06:15:57 -0700 (PDT) Received: from server2.sourceware.org (server2.sourceware.org. [8.43.85.97]) by mx.google.com with ESMTPS id a7-20020a05610222c700b0045b7f78bfb9si195795vsh.388.2023.11.03.06.15.57 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Nov 2023 06:15:57 -0700 (PDT) Received-SPF: pass (google.com: domain of binutils-bounces+ouuuleilei=gmail.com@sourceware.org designates 8.43.85.97 as permitted sender) client-ip=8.43.85.97; Authentication-Results: mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=tXZBAJ+r; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=tXZBAJ+r; arc=fail (signature failed); spf=pass (google.com: domain of binutils-bounces+ouuuleilei=gmail.com@sourceware.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="binutils-bounces+ouuuleilei=gmail.com@sourceware.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 6A8BC385841F for <ouuuleilei@gmail.com>; Fri, 3 Nov 2023 13:15:57 +0000 (GMT) X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2076.outbound.protection.outlook.com [40.107.20.76]) by sourceware.org (Postfix) with ESMTPS id 7544B3858D28 for <binutils@sourceware.org>; Fri, 3 Nov 2023 13:15:40 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 7544B3858D28 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 7544B3858D28 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.20.76 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1699017350; cv=pass; b=OMxCBSF0mCt9kXz91piuReFnjtMXCKHWqOkYc8Ga6DOYHpYiOlgWdHlXbGhMfEdqUX2haCzVxdn6z+HNqoSfWWf1PEOKUhsDtS4yyb/PUMR5oeFbTUxuqZp7RWIqA1unU2xezP0TcvEDCO+qTRZ/w5RoKcOsSvunT89rbG5e3BQ= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1699017350; c=relaxed/simple; bh=llxVTBQkxwIaKy8Sr2Cj70Yy94CDrfjRVt677aPq5nA=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=P13PTphzH202nle7KmxeK3WKu3d/oDQtxyqmJt/pHVo0YXK+3qK8mjCaPvAYLfCzHTXlgHnFA1BF9iUV54YsQhGmVNmrUAIZEFLZMUetYAvwLAx6oNCcxpMpgXnzQ9wWiZtBTq3Z2moax9CRfbLi8laus1DSPewVCdklMQwCqP0= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=ENiRagobmYCB+HJ9Fyl1w6dxkrhv93Wf2b9qECb2xEFehGpquYGIe5/k75T1Smg+sjt5RwFcAZRg9T5uWvj6SSHhhfCWvd5nlkka5FEo0AcLHfHD8pn6qaJuCtU0RhOPYu3yW2N9H4y0pZSsvvlPGskEsVIW6ZJIKl6cWLgG+JKTiZ5OKhQLVX1grDdTXUmwXEolEkZCPZhJRypY7dXiWnkbRbiZnPmOcdam/q8ktmJo+i3nE9Cvw6/iOG2W1ZGjn7irf+0HILCX2uBqb0pFkaPsqNN84XnKPnE97kXNrWlrBLwGJDXfRpLiYCviW1tqe3PJxiuN4Ao+bs07Ws1uhQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1pXq2wQ+WT709GK+5iE2CxLW8eoACII2lkyaQPjfKw8=; b=GcpHeuGyFDh+3yjh+F5EYZfkEBidRwYdBTJeE4/K9fs429somoBWhWSgV0mm8yCtjdmg5XKKjCWLsUqsQL8pJMhoghxv7qzSkXYQCCNDBSuhA10Qqo5P61bZZByX97eJnkd+YNiGq/Zfwh/1ylZ0aK32/t3bIH9OX200yUVVdN1Cti2eQtQVtUajyz6PqeznywCUjpKSyq79pRsilLSCfsGmkYTr9bGIS7kcvON0R866HdFhySRX+VflhBOulRj8VLGzQpQ7vV6WmKcNt978aZMIgRlC9exZTwJvE5ZZM513FheYaX5yZxgjm6UKYb+Mk5vJXMyD1WM4Kl/vZzKspw== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1, 1, smtp.mailfrom=arm.com] dmarc=[1, 1, header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1pXq2wQ+WT709GK+5iE2CxLW8eoACII2lkyaQPjfKw8=; b=tXZBAJ+rK08EvUzJR3O6qEfBLqCDirKEHDvog/X2cW4t4vHa7ABhA/F1CuVK+W0Sxi6ef3hGe4ZFnqicDrNfhqKbQj/GkS/0gGkU/sW+A9ePWq1MAqjp+5CMHqCwJjS40FbnVSf3HVGHQM7vnnKlt4kBUsp2mib6gBXfPJor9G4= Received: from AM5PR04CA0007.eurprd04.prod.outlook.com (2603:10a6:206:1::20) by PAVPR08MB9283.eurprd08.prod.outlook.com (2603:10a6:102:304::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.21; Fri, 3 Nov 2023 13:15:36 +0000 Received: from AMS0EPF000001A4.eurprd05.prod.outlook.com (2603:10a6:206:1:cafe::7) by AM5PR04CA0007.outlook.office365.com (2603:10a6:206:1::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.22 via Frontend Transport; Fri, 3 Nov 2023 13:15:36 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001A4.mail.protection.outlook.com (10.167.16.229) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.19 via Frontend Transport; Fri, 3 Nov 2023 13:15:36 +0000 Received: ("Tessian outbound 7c4ecdadb9e7:v228"); Fri, 03 Nov 2023 13:15:36 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 35e674c033c6aae1 X-CR-MTA-TID: 64aa7808 Received: from 9f3eaafb8239.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 7261F3C4-83B6-4458-BB1C-F0800D270983.1; Fri, 03 Nov 2023 13:15:29 +0000 Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9f3eaafb8239.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 03 Nov 2023 13:15:29 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lbSuDoHH0QEQgYMCSum/V3Kjxxz9D1ubTeCf66DZlhawVQeQj5pVa/IKOkMFl+AJqmLvfgN+Qg/xRybScJSyEMqrLkoJFTaiCrP2iiN/hbpFRBKIEX8GIgESS3LNCYQvZ/8N4S66CLscw0le2LsJgXWkgCosiL1Kcbp7JrVWmOEw7g3XAVtAkaoJ040SH+RyICavc0JVkDA3/lRs5qZQlAe8uXNv1EMKStRjVOVs+mMK+PVl31S8DDiPrZ/DwuCuxa7kSEDGRJh68J9Kv+q84j3GrTF1vzBNt2C21qizXuzemCZuIjyaEpub4NMPSq/s9qthmLZLS2tniO2lSruPSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1pXq2wQ+WT709GK+5iE2CxLW8eoACII2lkyaQPjfKw8=; b=Io63DgrQKB8ktXW3BLjHxBKQAYsBj2I8/F/1R7Axm6IHO9BsENptSLVtCvduLGpzptcIvIRrJNgyMnEc1BESkSMg++pNWrGiHiJdtUHgfRCNZum0PG79dAZ0n84OH56jIzINPoHmSai34LnkF4s053wgysWKWRuLO224CSouAy8kL6J5CvHOT7yRIFUYNsrfcaOE45+0pDRzqibwsXjg44eFviVqG4lw3kk2iz7n9ihuDOVcdvc4MRT4vd4XZKbxwqq4gV61S1/GLuP6mJo+XLpkXsZdp81RGbha9/1LbRM1PvKSopesMB2s0c8106XXpJ33kwYdDakYUL35GtilBQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1pXq2wQ+WT709GK+5iE2CxLW8eoACII2lkyaQPjfKw8=; b=tXZBAJ+rK08EvUzJR3O6qEfBLqCDirKEHDvog/X2cW4t4vHa7ABhA/F1CuVK+W0Sxi6ef3hGe4ZFnqicDrNfhqKbQj/GkS/0gGkU/sW+A9ePWq1MAqjp+5CMHqCwJjS40FbnVSf3HVGHQM7vnnKlt4kBUsp2mib6gBXfPJor9G4= Received: from DU2PR04CA0246.eurprd04.prod.outlook.com (2603:10a6:10:28e::11) by PAWPR08MB9830.eurprd08.prod.outlook.com (2603:10a6:102:2e2::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.21; Fri, 3 Nov 2023 13:15:27 +0000 Received: from DU2PEPF0001E9C5.eurprd03.prod.outlook.com (2603:10a6:10:28e:cafe::f0) by DU2PR04CA0246.outlook.office365.com (2603:10a6:10:28e::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.22 via Frontend Transport; Fri, 3 Nov 2023 13:15:27 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU2PEPF0001E9C5.mail.protection.outlook.com (10.167.8.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6954.19 via Frontend Transport; Fri, 3 Nov 2023 13:15:27 +0000 Received: from AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Fri, 3 Nov 2023 13:15:27 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Fri, 3 Nov 2023 13:15:27 +0000 Received: from armchair.cambridge.arm.com (10.2.80.71) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2507.32 via Frontend Transport; Fri, 3 Nov 2023 13:15:26 +0000 From: Szabolcs Nagy <szabolcs.nagy@arm.com> To: <binutils@sourceware.org> Subject: [PATCH 0/5] aarch64 BTI stub fixes Date: Fri, 3 Nov 2023 13:15:26 +0000 Message-ID: <cover.1699016830.git.szabolcs.nagy@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU2PEPF0001E9C5:EE_|PAWPR08MB9830:EE_|AMS0EPF000001A4:EE_|PAVPR08MB9283:EE_ X-MS-Office365-Filtering-Correlation-Id: 57b18124-66d2-4cc3-efa3-08dbdc6ef7e1 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(4636009)(376002)(396003)(136003)(39860400002)(346002)(230922051799003)(186009)(451199024)(64100799003)(1800799009)(82310400011)(46966006)(36840700001)(40470700004)(426003)(336012)(44832011)(26005)(70586007)(70206006)(81166007)(7696005)(8936002)(8676002)(40480700001)(5660300002)(36860700001)(82740400003)(316002)(2616005)(6916009)(86362001)(40460700003)(36756003)(47076005)(478600001)(41300700001)(356005)(83380400001)(2906002)(36900700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB9830 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001A4.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 18e60f16-95a8-4457-bf99-08dbdc6ef26b X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(346002)(396003)(39860400002)(136003)(376002)(230922051799003)(1800799009)(186009)(64100799003)(82310400011)(451199024)(40470700004)(46966006)(36840700001)(40460700003)(2616005)(26005)(7696005)(47076005)(36860700001)(426003)(5660300002)(336012)(2906002)(83380400001)(478600001)(41300700001)(44832011)(8936002)(8676002)(70206006)(70586007)(6916009)(316002)(81166007)(82740400003)(36756003)(86362001)(40480700001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Nov 2023 13:15:36.5880 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 57b18124-66d2-4cc3-efa3-08dbdc6ef7e1 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001A4.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAVPR08MB9283 X-Spam-Status: No, score=-5.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, FORGED_SPF_HELO, KAM_DMARC_NONE, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list <binutils.sourceware.org> List-Unsubscribe: <https://sourceware.org/mailman/options/binutils>, <mailto:binutils-request@sourceware.org?subject=unsubscribe> List-Archive: <https://sourceware.org/pipermail/binutils/> List-Post: <mailto:binutils@sourceware.org> List-Help: <mailto:binutils-request@sourceware.org?subject=help> List-Subscribe: <https://sourceware.org/mailman/listinfo/binutils>, <mailto:binutils-request@sourceware.org?subject=subscribe> Errors-To: binutils-bounces+ouuuleilei=gmail.com@sourceware.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781548824593944413 X-GMAIL-MSGID: 1781548824593944413 |
Series | aarch64 BTI stub fixes | |
Message
Szabolcs Nagy
Nov. 3, 2023, 1:15 p.m. UTC
Large binaries with BTI can be linked incorrectly with binutils 2.41 because PR30930. there are other less critical related issues fixed in this patchset as well. Szabolcs Nagy (5): bfd: aarch64: Fix BTI stub optimization PR30957 bfd: aarch64: Fix broken BTI stub PR30930 bfd: aarch64: Fix leaks in case of BTI stub reuse bfd: aarch64: Avoid BTI stub for a PLT that has BTI ld: aarch64: Add BTI stub insertion test PR30930 bfd/elfnn-aarch64.c | 89 +++++++++++++++++-------- ld/testsuite/ld-aarch64/aarch64-elf.exp | 1 + ld/testsuite/ld-aarch64/bti-far-3.d | 87 ++++++++++++++++++++++++ ld/testsuite/ld-aarch64/bti-far-3.ld | 12 ++++ ld/testsuite/ld-aarch64/bti-far-3a.s | 23 +++++++ ld/testsuite/ld-aarch64/bti-far-3b.s | 25 +++++++ ld/testsuite/ld-aarch64/bti-far-3c.s | 24 +++++++ 7 files changed, 232 insertions(+), 29 deletions(-) create mode 100644 ld/testsuite/ld-aarch64/bti-far-3.d create mode 100644 ld/testsuite/ld-aarch64/bti-far-3.ld create mode 100644 ld/testsuite/ld-aarch64/bti-far-3a.s create mode 100644 ld/testsuite/ld-aarch64/bti-far-3b.s create mode 100644 ld/testsuite/ld-aarch64/bti-far-3c.s
Comments
Hi Szabolcs, > Large binaries with BTI can be linked incorrectly with > binutils 2.41 because PR30930. > > there are other less critical related issues fixed in > this patchset as well. > > Szabolcs Nagy (5): > bfd: aarch64: Fix BTI stub optimization PR30957 > bfd: aarch64: Fix broken BTI stub PR30930 > bfd: aarch64: Fix leaks in case of BTI stub reuse > bfd: aarch64: Avoid BTI stub for a PLT that has BTI > ld: aarch64: Add BTI stub insertion test PR30930 This patch series looks good to me, so please apply if you have not already done so. FYI - I did find one regression in the linker testsuite with the patch applied: FAIL: Check linker stubs with indirect calls handle BTI (exe). However there are mitigating circumstances: * The failure was for an unusual toolchain configuration: --target=aarch64_be-linux-gnu_ilp32 * The three other tests in this part of the testsuite also fail, both with and without your patch applied: FAIL: Check linker stubs with indirect calls handle BTI (shared lib). FAIL: Check linker stubs with indirect calls handle BTI (exe). FAIL: Check linker stubs with indirect calls handle BTI when target has BTI. Note: there appear to be *two* tests called "check linker stubs with indirect calls handle BTI (exe)." I leave it up to you to decide if it is worth fixing these tests. Cheers Nick PS. My gut feeling at the moment is that we do not need a 2.41.1 release for this patch, since AArch64 systems with BTI enabled are not yet the norm, and those that do exist are being used to test for problems like this rather than general use. Since your patch will be in the 2.42 release, due January next year, I think that that will be a reasonable timescale for getting the fix out there. Do you agree ?
The 11/07/2023 11:38, Nick Clifton wrote: > Hi Szabolcs, > > > Large binaries with BTI can be linked incorrectly with > > binutils 2.41 because PR30930. > > > > there are other less critical related issues fixed in > > this patchset as well. > > > > Szabolcs Nagy (5): > > bfd: aarch64: Fix BTI stub optimization PR30957 > > bfd: aarch64: Fix broken BTI stub PR30930 > > bfd: aarch64: Fix leaks in case of BTI stub reuse > > bfd: aarch64: Avoid BTI stub for a PLT that has BTI > > ld: aarch64: Add BTI stub insertion test PR30930 > > This patch series looks good to me, so please apply if you have not already done so. > > > FYI - I did find one regression in the linker testsuite with the patch applied: > > FAIL: Check linker stubs with indirect calls handle BTI (exe). > > However there are mitigating circumstances: > > * The failure was for an unusual toolchain configuration: > > --target=aarch64_be-linux-gnu_ilp32 > > * The three other tests in this part of the testsuite also fail, both > with and without your patch applied: > > FAIL: Check linker stubs with indirect calls handle BTI (shared lib). > FAIL: Check linker stubs with indirect calls handle BTI (exe). > FAIL: Check linker stubs with indirect calls handle BTI when target has BTI. > > Note: there appear to be *two* tests called "check linker stubs with indirect calls handle BTI (exe)." > > I leave it up to you to decide if it is worth fixing these tests. thanks for looking at this. i will have to check what's going on. > PS. My gut feeling at the moment is that we do not need a 2.41.1 release > for this patch, since AArch64 systems with BTI enabled are not yet the norm, > and those that do exist are being used to test for problems like this rather > than general use. Since your patch will be in the 2.42 release, due January > next year, I think that that will be a reasonable timescale for getting the > fix out there. Do you agree ? makes sense, unless it affects hardened kernel builds. i will have to check if that's an issue. thanks.
The 11/07/2023 13:08, Szabolcs Nagy wrote: > The 11/07/2023 11:38, Nick Clifton wrote: > > FYI - I did find one regression in the linker testsuite with the patch applied: > > > > FAIL: Check linker stubs with indirect calls handle BTI (exe). > > > > However there are mitigating circumstances: > > > > * The failure was for an unusual toolchain configuration: > > > > --target=aarch64_be-linux-gnu_ilp32 > > > > * The three other tests in this part of the testsuite also fail, both > > with and without your patch applied: > > > > FAIL: Check linker stubs with indirect calls handle BTI (shared lib). > > FAIL: Check linker stubs with indirect calls handle BTI (exe). > > FAIL: Check linker stubs with indirect calls handle BTI when target has BTI. > > > > Note: there appear to be *two* tests called "check linker stubs with indirect calls handle BTI (exe)." > > > > I leave it up to you to decide if it is worth fixing these tests. > > thanks for looking at this. > i will have to check what's going on. i will change the name of the new test to be unique. cleaning up ilp32 test issues will be a fair bit of work. i can commit a followup patch to force the tests i added to use lp64 abi, like we do on other tests, but this is not ideal. > > PS. My gut feeling at the moment is that we do not need a 2.41.1 release > > for this patch, since AArch64 systems with BTI enabled are not yet the norm, > > and those that do exist are being used to test for problems like this rather > > than general use. Since your patch will be in the 2.42 release, due January > > next year, I think that that will be a reasonable timescale for getting the > > fix out there. Do you agree ? > > makes sense, > unless it affects hardened kernel builds. > i will have to check if that's an issue. in practice i think the kernel should be fine. (it's hard to say conclusively) but i plan to backport the patches even if we don't arrange a new release.
On Thu, Nov 9, 2023 at 6:58 AM Szabolcs Nagy <szabolcs.nagy@arm.com> wrote: > > The 11/07/2023 13:08, Szabolcs Nagy wrote: > > The 11/07/2023 11:38, Nick Clifton wrote: > > > FYI - I did find one regression in the linker testsuite with the patch applied: > > > > > > FAIL: Check linker stubs with indirect calls handle BTI (exe). > > > > > > However there are mitigating circumstances: > > > > > > * The failure was for an unusual toolchain configuration: > > > > > > --target=aarch64_be-linux-gnu_ilp32 > > > > > > * The three other tests in this part of the testsuite also fail, both > > > with and without your patch applied: > > > > > > FAIL: Check linker stubs with indirect calls handle BTI (shared lib). > > > FAIL: Check linker stubs with indirect calls handle BTI (exe). > > > FAIL: Check linker stubs with indirect calls handle BTI when target has BTI. > > > > > > Note: there appear to be *two* tests called "check linker stubs with indirect calls handle BTI (exe)." > > > > > > I leave it up to you to decide if it is worth fixing these tests. > > > > thanks for looking at this. > > i will have to check what's going on. > > i will change the name of the new test to be unique. > > cleaning up ilp32 test issues will be a fair bit of work. > > i can commit a followup patch to force the tests i added to use > lp64 abi, like we do on other tests, but this is not ideal. > > > > PS. My gut feeling at the moment is that we do not need a 2.41.1 release > > > for this patch, since AArch64 systems with BTI enabled are not yet the norm, > > > and those that do exist are being used to test for problems like this rather > > > than general use. Since your patch will be in the 2.42 release, due January > > > next year, I think that that will be a reasonable timescale for getting the > > > fix out there. Do you agree ? > > > > makes sense, > > unless it affects hardened kernel builds. > > i will have to check if that's an issue. > > in practice i think the kernel should be fine. > (it's hard to say conclusively) > > but i plan to backport the patches even if we don't arrange > a new release. % grep '\.zero' ld/testsuite/ld-aarch64/bti-far* ld/testsuite/ld-aarch64/bti-far-3a.s:.zero 0x07000000 ld/testsuite/ld-aarch64/bti-far-3b.s:.zero 0x01000000 ld/testsuite/ld-aarch64/bti-far-3b.s:.zero 0x07000000 ld/testsuite/ld-aarch64/bti-far-3c.s:.zero 0x01000000 % size ld/tmpdir/bti-far-* text data bss dec hex filename 117440552 0 0 117440552 7000028 ld/tmpdir/bti-far-3a.o 134217768 0 0 134217768 8000028 ld/tmpdir/bti-far-3b.o 16777260 0 0 16777260 100002c ld/tmpdir/bti-far-3c.o 132 0 0 132 84 ld/tmpdir/bti-far-opt.o `.zero 0x07000000` is 112MiB. Perhaps use output section addresses (e.g. [1]) to make the files smaller? [1]: https://github.com/llvm/llvm-project/blob/de176d8c5496d6cf20e82aface98e102c593dbe2/lld/test/ELF/aarch64-thunk-pi.s#L112
The 11/17/2023 00:42, Fangrui Song wrote: > On Thu, Nov 9, 2023 at 6:58 AM Szabolcs Nagy <szabolcs.nagy@arm.com> wrote: > `.zero 0x07000000` is 112MiB. Perhaps use output section > addresses (e.g. [1]) to make the files smaller? i cannot reproduce the original bug with different output sections. the bug requires the next input section after the inserted stubs to be grouped with those stubs. which i think does not happen in bfd ld if the next input section goes to a different output section. > > [1]: https://github.com/llvm/llvm-project/blob/de176d8c5496d6cf20e82aface98e102c593dbe2/lld/test/ELF/aarch64-thunk-pi.s#L112