From: Will Deacon <will.deacon@arm.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: linux-arm-kernel@lists.infradead.org,
linux-kernel@vger.kernel.org, adech.fo@gmail.com,
aryabinin@virtuozzo.com, catalin.marinas@arm.com,
christoffer.dall@linaro.org, dvyukov@google.com,
linux-kbuild@vger.kernel.org, marc.zyngier@arm.com,
yamada.masahiro@socionext.com
Subject: Re: [PATCH 2/4] arm64: prevent instrumentation of LL/SC atomics
Date: Wed, 18 Oct 2017 15:16:35 +0100 [thread overview]
Message-ID: <20171018141635.GD21820@arm.com> (raw)
In-Reply-To: <20171017125516.7d7l5jczqwsm5vxn@lakrids.cambridge.arm.com>
On Tue, Oct 17, 2017 at 01:55:16PM +0100, Mark Rutland wrote:
> On Tue, Oct 17, 2017 at 12:38:14PM +0100, Will Deacon wrote:
> > On Tue, Oct 17, 2017 at 12:10:33PM +0100, Mark Rutland wrote:
> > > On Tue, Oct 17, 2017 at 11:58:58AM +0100, Will Deacon wrote:
> > > > On Tue, Oct 17, 2017 at 11:54:54AM +0100, Mark Rutland wrote:
> > > > > On Tue, Oct 17, 2017 at 11:03:15AM +0100, Will Deacon wrote:
> > > > > > On Mon, Oct 16, 2017 at 02:24:38PM +0100, Mark Rutland wrote:
> > > > > > > While we build the LL/SC atomics as a C object file, this does not
> > > > > > > follow the AAPCS. This does not interoperate with other C code, and can
> > > > > > > only be called from special wrapper assembly.
> > > > > > >
> > > > > > > Bulding a kernel with CONFIG_KCOV and CONFIG_ARM64_LSE_ATOMICS results
> > > > > > > in the cmopiler inserting calls to __sanitizer_cov_trace_pc within the
> > > > > > > LL/SC atomics. As __sanitizer_cov_trace_pc is built per the AAPCS, these
> > > > > > > calls corrupt register values, resulting in failures at boot time.
> > > > > > >
> > > > > > > Avoid this (and other similar issues) by opting out of all compiler
> > > > > > > instrumentation. We can opt-in to specific instrumentation in future if
> > > > > > > we want to.
> > >
> > > > > > > diff --git a/arch/arm64/lib/Makefile b/arch/arm64/lib/Makefile
> > > > > > > index a0abc142c92b..af77516f71b2 100644
> > > > > > > --- a/arch/arm64/lib/Makefile
> > > > > > > +++ b/arch/arm64/lib/Makefile
> > > > > > > @@ -17,5 +17,6 @@ CFLAGS_atomic_ll_sc.o := -fcall-used-x0 -ffixed-x1 -ffixed-x2 \
> > > > > > > -fcall-saved-x10 -fcall-saved-x11 -fcall-saved-x12 \
> > > > > > > -fcall-saved-x13 -fcall-saved-x14 -fcall-saved-x15 \
> > > > > > > -fcall-saved-x18
> > > > > > > +CC_INSTRUMENT_atomic_ll_sc.o := n
> > > > > >
> > > > > > Does this mean we can lose the "notrace" definition of __LL_SC_INLINE
> > > > > > when generating the out-of-line atomics?
> > > > >
> > > > > Unfortunately not.
> > > > >
> > > > > I'd missed -pg, since that isn't handled in scripts/Makefile.lib, and
> > > > > doesn't seem to have a makefile-level disable.
> > > > >
> > > > > I'll see if that can be remedied.
> > > >
> > > > Thanks. It's a real shame to have a "just use this option to avoid
> > > > instrumentation" if it doesn't actually catch everything.
> > >
> > > Agreed; it defeats the purpose of the exercise.
> > >
> > > > We probably need to think about kprobes too, but not really sure what
> > > > you can do there on a per-file basis.
> > >
> > > Ugh; that's a much more painful one, yes. :(
> > >
> > > Does that rely on any compiler options at all? I thought was all a
> > > runtime thing.
> > >
> > > Arguably it is somewhat separate for compiler instrumentation, and it
> > > might make sense for that to be a separate option.
> >
> > Yes, I suppose the problem here is that opting out of dynamic tracing
> > requires function attributes such as notrace and __kprobes, rather than a
> > compiler flag. If there's no way to say to the compiler "act as though
> > every function in this compilation unit is tagged with this attribute" then
> > we probably can't do anything to solve this easily.
>
> Unfortunately, I'm not aware of any way to do that short of using a
> linker script to rewrite sections.
>
> > We should probably add __kprobes to __LL_SC_INLINE though.
>
> Agreed.
>
> It's a different case, but kprobes can use atomics behind the scenes
> (e.g. via aarch64_insn_patch_text_cb()), and so those need to be
> blacklisted.
>
> I'll add a patch to this series, unless you plan to put one together.
Don't mind either way. If you post the next version without, I can just
add it on top.
Will
WARNING: multiple messages have this Message-ID (diff)
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH 2/4] arm64: prevent instrumentation of LL/SC atomics
Date: Wed, 18 Oct 2017 15:16:35 +0100 [thread overview]
Message-ID: <20171018141635.GD21820@arm.com> (raw)
In-Reply-To: <20171017125516.7d7l5jczqwsm5vxn@lakrids.cambridge.arm.com>
On Tue, Oct 17, 2017 at 01:55:16PM +0100, Mark Rutland wrote:
> On Tue, Oct 17, 2017 at 12:38:14PM +0100, Will Deacon wrote:
> > On Tue, Oct 17, 2017 at 12:10:33PM +0100, Mark Rutland wrote:
> > > On Tue, Oct 17, 2017 at 11:58:58AM +0100, Will Deacon wrote:
> > > > On Tue, Oct 17, 2017 at 11:54:54AM +0100, Mark Rutland wrote:
> > > > > On Tue, Oct 17, 2017 at 11:03:15AM +0100, Will Deacon wrote:
> > > > > > On Mon, Oct 16, 2017 at 02:24:38PM +0100, Mark Rutland wrote:
> > > > > > > While we build the LL/SC atomics as a C object file, this does not
> > > > > > > follow the AAPCS. This does not interoperate with other C code, and can
> > > > > > > only be called from special wrapper assembly.
> > > > > > >
> > > > > > > Bulding a kernel with CONFIG_KCOV and CONFIG_ARM64_LSE_ATOMICS results
> > > > > > > in the cmopiler inserting calls to __sanitizer_cov_trace_pc within the
> > > > > > > LL/SC atomics. As __sanitizer_cov_trace_pc is built per the AAPCS, these
> > > > > > > calls corrupt register values, resulting in failures at boot time.
> > > > > > >
> > > > > > > Avoid this (and other similar issues) by opting out of all compiler
> > > > > > > instrumentation. We can opt-in to specific instrumentation in future if
> > > > > > > we want to.
> > >
> > > > > > > diff --git a/arch/arm64/lib/Makefile b/arch/arm64/lib/Makefile
> > > > > > > index a0abc142c92b..af77516f71b2 100644
> > > > > > > --- a/arch/arm64/lib/Makefile
> > > > > > > +++ b/arch/arm64/lib/Makefile
> > > > > > > @@ -17,5 +17,6 @@ CFLAGS_atomic_ll_sc.o := -fcall-used-x0 -ffixed-x1 -ffixed-x2 \
> > > > > > > -fcall-saved-x10 -fcall-saved-x11 -fcall-saved-x12 \
> > > > > > > -fcall-saved-x13 -fcall-saved-x14 -fcall-saved-x15 \
> > > > > > > -fcall-saved-x18
> > > > > > > +CC_INSTRUMENT_atomic_ll_sc.o := n
> > > > > >
> > > > > > Does this mean we can lose the "notrace" definition of __LL_SC_INLINE
> > > > > > when generating the out-of-line atomics?
> > > > >
> > > > > Unfortunately not.
> > > > >
> > > > > I'd missed -pg, since that isn't handled in scripts/Makefile.lib, and
> > > > > doesn't seem to have a makefile-level disable.
> > > > >
> > > > > I'll see if that can be remedied.
> > > >
> > > > Thanks. It's a real shame to have a "just use this option to avoid
> > > > instrumentation" if it doesn't actually catch everything.
> > >
> > > Agreed; it defeats the purpose of the exercise.
> > >
> > > > We probably need to think about kprobes too, but not really sure what
> > > > you can do there on a per-file basis.
> > >
> > > Ugh; that's a much more painful one, yes. :(
> > >
> > > Does that rely on any compiler options at all? I thought was all a
> > > runtime thing.
> > >
> > > Arguably it is somewhat separate for compiler instrumentation, and it
> > > might make sense for that to be a separate option.
> >
> > Yes, I suppose the problem here is that opting out of dynamic tracing
> > requires function attributes such as notrace and __kprobes, rather than a
> > compiler flag. If there's no way to say to the compiler "act as though
> > every function in this compilation unit is tagged with this attribute" then
> > we probably can't do anything to solve this easily.
>
> Unfortunately, I'm not aware of any way to do that short of using a
> linker script to rewrite sections.
>
> > We should probably add __kprobes to __LL_SC_INLINE though.
>
> Agreed.
>
> It's a different case, but kprobes can use atomics behind the scenes
> (e.g. via aarch64_insn_patch_text_cb()), and so those need to be
> blacklisted.
>
> I'll add a patch to this series, unless you plan to put one together.
Don't mind either way. If you post the next version without, I can just
add it on top.
Will
next prev parent reply other threads:[~2017-10-18 14:16 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-16 13:24 [PATCH 0/4] Cleanup instrumentation avoidance Mark Rutland
2017-10-16 13:24 ` Mark Rutland
2017-10-16 13:24 ` [PATCH 1/4] kbuild: allow global override of CC instrumentation Mark Rutland
2017-10-16 13:24 ` Mark Rutland
2017-10-17 10:37 ` Will Deacon
2017-10-17 10:37 ` Will Deacon
2017-10-16 13:24 ` [PATCH 2/4] arm64: prevent instrumentation of LL/SC atomics Mark Rutland
2017-10-16 13:24 ` Mark Rutland
2017-10-17 10:03 ` Will Deacon
2017-10-17 10:03 ` Will Deacon
2017-10-17 10:54 ` Mark Rutland
2017-10-17 10:54 ` Mark Rutland
2017-10-17 10:58 ` Will Deacon
2017-10-17 10:58 ` Will Deacon
2017-10-17 11:10 ` Mark Rutland
2017-10-17 11:10 ` Mark Rutland
2017-10-17 11:38 ` Will Deacon
2017-10-17 11:38 ` Will Deacon
2017-10-17 12:55 ` Mark Rutland
2017-10-17 12:55 ` Mark Rutland
2017-10-18 14:16 ` Will Deacon [this message]
2017-10-18 14:16 ` Will Deacon
2017-10-16 13:24 ` [PATCH 3/4] kvm/arm64: simplify CC instrumentation opt-out Mark Rutland
2017-10-16 13:24 ` Mark Rutland
2017-10-17 14:50 ` Christoffer Dall
2017-10-17 14:50 ` Christoffer Dall
2017-10-16 13:24 ` [PATCH 4/4] arm64: vdso: remove pointless gcov option Mark Rutland
2017-10-16 13:24 ` Mark Rutland
2017-10-17 13:56 ` Mark Rutland
2017-10-17 13:56 ` Mark Rutland
2017-10-16 13:35 ` [PATCH 0/4] Cleanup instrumentation avoidance Mark Rutland
2017-10-16 13:35 ` Mark Rutland
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171018141635.GD21820@arm.com \
--to=will.deacon@arm.com \
--cc=adech.fo@gmail.com \
--cc=aryabinin@virtuozzo.com \
--cc=catalin.marinas@arm.com \
--cc=christoffer.dall@linaro.org \
--cc=dvyukov@google.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kbuild@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marc.zyngier@arm.com \
--cc=mark.rutland@arm.com \
--cc=yamada.masahiro@socionext.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.