From: David Laight <david.laight.linux@gmail.com>
To: Josh Poimboeuf <jpoimboe@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>,
x86@kernel.org, linux-kernel@vger.kernel.org,
live-patching@vger.kernel.org,
Joe Lawrence <joe.lawrence@redhat.com>,
Song Liu <song@kernel.org>, Miroslav Benes <mbenes@suse.cz>,
Petr Mladek <pmladek@suse.com>
Subject: Re: [PATCH 45/48] x86/Kconfig: Enable CONFIG_PREFIX_SYMBOLS for FineIBT
Date: Tue, 28 Apr 2026 02:37:17 +0100 [thread overview]
Message-ID: <20260428023717.6a7c68c6@pumpkin> (raw)
In-Reply-To: <c7vi7gpfrybjmngjoqu2jmirh6jp53bpw5edeoeupz5gwhw6gx@fvcn6l6vgl47>
On Thu, 23 Apr 2026 20:38:02 -0700
Josh Poimboeuf <jpoimboe@kernel.org> wrote:
> On Thu, Apr 23, 2026 at 04:30:47PM -0700, Josh Poimboeuf wrote:
> > On Thu, Apr 23, 2026 at 09:23:12AM -0700, Josh Poimboeuf wrote:
> > > On Thu, Apr 23, 2026 at 05:19:25PM +0200, Peter Zijlstra wrote:
> > > > On Thu, Apr 23, 2026 at 08:16:08AM -0700, Josh Poimboeuf wrote:
> > > > > On Thu, Apr 23, 2026 at 10:47:58AM +0200, Peter Zijlstra wrote:
> > > > > > On Wed, Apr 22, 2026 at 09:04:13PM -0700, Josh Poimboeuf wrote:
> > > > > > > PREFIX_SYMBOLS has a !CFI dependency because the compiler already
> > > > > > > generates __cfi_ prefix symbols for kCFI builds, so objtool-generated
> > > > > > > __pfx_ symbols were considered redundant.
> > > > > > >
> > > > > > > However, the __cfi_ symbols only cover the 5-byte kCFI type hash. With
> > > > > > > FUNCTION_CALL_PADDING, there are also 11 bytes of NOP padding between
> > > > > > > the hash and the function entry which have no symbol to claim them.
> > > > > >
> > > > > > If you force the function alignment to 64 bytes, the prefix will also be
> > > > > > 64bytes, rather than the normal 16.
> > > > >
> > > > > Sorry, how do you get 64 here?
> > > >
> > > > DEBUG_FORCE_FUNCTION_ALIGNMENT_64B=y
> > >
> > > Ok, so in that case it would be 5-byte cfi symbol and 59-byte NOP gap.
> > > Or a 64-byte pfx for the !CFI case.
> > >
> > > > > > > The NOPs can be rewritten with call depth tracking thunks at runtime.
> > > > > > > Without a symbol, unwinders and other tools that symbolize code
> > > > > > > locations misattribute those bytes.
> > > > > > >
> > > > > > > Remove the !CFI guard so objtool creates __pfx_ symbols for all
> > > > > > > CALL_PADDING configs, covering the full padding area regardless of
> > > > > > > whether there's also a __cfi_ symbol.
> > > > > >
> > > > > > Egads, that a ton of symbols :/ Does it not make sense to 'fix' up the
> > > > > > __cfi_ symbols to cover the whole prefix?
> > > > >
> > > > > Yeah, I suppose that would be better, via objtool I presume.
> > > >
> > > > Yup.
>
> I discovered it's not just FineIBT, it's basically any CALL_PADDING+CFI,
> like so:
>
> From: Josh Poimboeuf <jpoimboe@kernel.org>
> Subject: [PATCH] objtool: Grow __cfi_* symbols for all kCFI+CALL_PADDING
>
> For all CONFIG_CFI+CONFIG_CALL_PADDING configs, the __cfi_ symbols only
> cover the 5-byte kCFI type hash. After that there also N bytes of NOP
> padding between the hash and the function entry which aren't associated
> with any symbol.
>
> The NOPs can be replaced with actual code at runtime. Without a symbol,
> unwinders and tooling have no way of knowing where those bytes belong.
>
> Grow the existing __cfi_* symbols to fill that gap.
>
> Also, CONFIG_PREFIX_SYMBOLS has no reason to exist: CONFIG_CALL_PADDING
> is what causes the compiler to emit NOP padding before function entry
> (via -fpatchable-function-entry), so it's the right condition for
> creating prefix symbols.
>
> Remove CONFIG_PREFIX_SYMBOLS, as it's no longer needed. Simplify the
> LONGEST_SYM_KUNIT_TEST dependency accordingly.
>
> Update the --cfi and --prefix usage strings to reflect their current
> scope.
>
> Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
> ---
...
> diff --git a/tools/objtool/builtin-check.c b/tools/objtool/builtin-check.c
> index ec7f10a5ef19..254ceb6b0e2c 100644
> --- a/tools/objtool/builtin-check.c
> +++ b/tools/objtool/builtin-check.c
> @@ -73,7 +73,6 @@ static int parse_hacks(const struct option *opt, const char *str, int unset)
>
> static const struct option check_options[] = {
> OPT_GROUP("Actions:"),
> - OPT_BOOLEAN(0, "cfi", &opts.cfi, "annotate kernel control flow integrity (kCFI) function preambles"),
> OPT_STRING_OPTARG('d', "disas", &opts.disas, "function-pattern", "disassemble functions", "*"),
> OPT_CALLBACK_OPTARG('h', "hacks", NULL, NULL, "jump_label,noinstr,skylake", "patch toolchain bugs/limitations", parse_hacks),
> OPT_BOOLEAN('i', "ibt", &opts.ibt, "validate and annotate IBT"),
> @@ -84,7 +83,7 @@ static const struct option check_options[] = {
> OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"),
> OPT_BOOLEAN(0, "rethunk", &opts.rethunk, "validate and annotate rethunk usage"),
> OPT_BOOLEAN(0, "unret", &opts.unret, "validate entry unret placement"),
> - OPT_INTEGER(0, "prefix", &opts.prefix, "generate prefix symbols"),
> + OPT_INTEGER(0, "prefix", &opts.prefix, "generate or grow prefix symbols for N-byte function padding"),
> OPT_BOOLEAN('l', "sls", &opts.sls, "validate straight-line-speculation mitigations"),
> OPT_BOOLEAN('s', "stackval", &opts.stackval, "validate frame pointer rules"),
> OPT_BOOLEAN('t', "static-call", &opts.static_call, "annotate static calls"),
> @@ -92,6 +91,7 @@ static const struct option check_options[] = {
> OPT_CALLBACK_OPTARG(0, "dump", NULL, NULL, "orc", "dump metadata", parse_dump),
>
> OPT_GROUP("Options:"),
> + OPT_BOOLEAN(0, "cfi", &opts.cfi, "annotate and grow kCFI preamble symbols (use with --prefix)"),
> OPT_BOOLEAN(0, "backtrace", &opts.backtrace, "unwind on error"),
> OPT_BOOLEAN(0, "backup", &opts.backup, "create backup (.orig) file on warning/error"),
> OPT_BOOLEAN(0, "dry-run", &opts.dryrun, "don't write modifications"),
> @@ -163,6 +163,11 @@ static bool opts_valid(void)
> return false;
> }
>
> + if (opts.cfi && !opts.prefix) {
> + ERROR("--cfi requires --prefix");
> + return false;
> + }
> +
Wouldn't it be more friendly to have:
opts.prefix |= opts.cfi;
and change the help to (implies --prefix).
David
next prev parent reply other threads:[~2026-04-28 1:37 UTC|newest]
Thread overview: 148+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-23 4:03 [PATCH 00/48] objtool/klp: Some klp-build fixes and improvements Josh Poimboeuf
2026-04-23 4:03 ` [PATCH 01/48] objtool/klp: Fix is_uncorrelated_static_local() for Clang Josh Poimboeuf
2026-04-23 18:45 ` Song Liu
2026-04-24 9:17 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 02/48] objtool/klp: Fix .data..once static local non-correlation Josh Poimboeuf
2026-04-23 18:54 ` Song Liu
2026-04-23 23:34 ` Josh Poimboeuf
2026-04-23 23:54 ` Song Liu
2026-04-24 9:21 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 03/48] objtool/klp: Don't correlate __ADDRESSABLE() symbols Josh Poimboeuf
2026-04-24 9:23 ` Miroslav Benes
2026-04-24 9:34 ` Miroslav Benes
2026-04-27 19:00 ` Josh Poimboeuf
2026-04-28 6:35 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 04/48] objtool/klp: Ignore __UNIQUE_ID_*() PCI stub functions Josh Poimboeuf
2026-04-23 19:05 ` Song Liu
2026-04-23 19:31 ` Josh Poimboeuf
2026-04-23 21:33 ` Song Liu
2026-04-23 23:50 ` Josh Poimboeuf
2026-04-23 23:54 ` Song Liu
2026-04-24 11:26 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 05/48] objtool: Move mark_rodata() to elf.c Josh Poimboeuf
2026-04-23 8:19 ` Peter Zijlstra
2026-04-24 11:36 ` Miroslav Benes
2026-04-24 20:41 ` Song Liu
2026-04-23 4:03 ` [PATCH 06/48] objtool/klp: Don't correlate rodata symbols Josh Poimboeuf
2026-04-24 11:54 ` Miroslav Benes
2026-04-28 15:46 ` Josh Poimboeuf
2026-04-23 4:03 ` [PATCH 07/48] objtool/klp: Don't correlate absolute symbols Josh Poimboeuf
2026-04-24 12:04 ` Miroslav Benes
2026-04-24 20:56 ` Song Liu
2026-04-23 4:03 ` [PATCH 08/48] objtool/klp: Don't correlate __initstub__ symbols Josh Poimboeuf
2026-04-24 12:17 ` Miroslav Benes
2026-04-24 20:57 ` Song Liu
2026-04-23 4:03 ` [PATCH 09/48] objtool/klp: Fix create_fake_symbols() skipping entsize-based sections Josh Poimboeuf
2026-04-24 21:00 ` Song Liu
2026-04-28 11:45 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 10/48] objtool/klp: Fix --debug-checksum for duplicate symbol names Josh Poimboeuf
2026-04-24 21:06 ` Song Liu
2026-04-28 12:12 ` Miroslav Benes
2026-04-28 16:30 ` Josh Poimboeuf
2026-04-23 4:03 ` [PATCH 11/48] objtool/klp: Fix handling of zero-length .altinstr_replacement sections Josh Poimboeuf
2026-04-24 21:19 ` Song Liu
2026-04-28 15:49 ` Josh Poimboeuf
2026-04-28 12:12 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 12/48] objtool/klp: Fix cloning of zero-length section symbols Josh Poimboeuf
2026-04-24 21:24 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 13/48] objtool/klp: Fix XXH3 state memory leak Josh Poimboeuf
2026-04-24 21:28 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 14/48] objtool/klp: Fix extraction of text annotations for alternatives Josh Poimboeuf
2026-04-24 21:37 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 15/48] objtool/klp: Fix kCFI trap handling Josh Poimboeuf
2026-04-24 21:38 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 16/48] objtool/klp: Fix relocation conversion failures for R_X86_64_NONE Josh Poimboeuf
2026-04-24 21:35 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 17/48] objtool: Fix reloc hash collision in find_reloc_by_dest_range() Josh Poimboeuf
2026-04-23 8:32 ` Peter Zijlstra
2026-04-23 16:34 ` Josh Poimboeuf
2026-04-24 21:47 ` Song Liu
2026-04-28 12:42 ` Miroslav Benes
2026-04-23 4:03 ` [PATCH 18/48] klp-build: Fix hang on out-of-date .config Josh Poimboeuf
2026-04-24 21:51 ` Song Liu
2026-04-28 15:57 ` Josh Poimboeuf
2026-04-23 4:03 ` [PATCH 19/48] klp-build: Fix checksum comparison for changed offsets Josh Poimboeuf
2026-04-23 4:03 ` [PATCH 20/48] klp-build: Don't use errexit Josh Poimboeuf
2026-04-24 22:07 ` Song Liu
2026-04-23 4:03 ` [PATCH 21/48] klp-build: Validate patch file existence Josh Poimboeuf
2026-04-24 21:53 ` Song Liu
2026-04-23 4:03 ` [PATCH 22/48] klp-build: Suppress excessive fuzz output by default Josh Poimboeuf
2026-04-24 21:54 ` Song Liu
2026-04-23 4:03 ` [PATCH 23/48] klp-build: Fix patch cleanup on interrupt Josh Poimboeuf
2026-04-24 21:56 ` Song Liu
2026-04-23 4:03 ` [PATCH 24/48] klp-build: Reject patches to vDSO Josh Poimboeuf
2026-04-24 21:57 ` Song Liu
2026-04-23 4:03 ` [PATCH 25/48] klp-build: Reject patches to realmode Josh Poimboeuf
2026-04-24 21:57 ` Song Liu
2026-04-23 4:03 ` [PATCH 26/48] objtool/klp: Don't set sym->file for section symbols Josh Poimboeuf
2026-04-23 8:34 ` Peter Zijlstra
2026-04-24 21:58 ` Song Liu
2026-04-23 4:03 ` [PATCH 27/48] objtool: Include libsubcmd headers directly from source tree Josh Poimboeuf
2026-04-24 21:59 ` Song Liu
2026-04-23 4:03 ` [PATCH 28/48] objtool/klp: Create empty checksum sections for function-less object files Josh Poimboeuf
2026-04-24 22:08 ` Song Liu
2026-04-23 4:03 ` [PATCH 29/48] klp-build: Print "objtool klp diff" command in verbose mode Josh Poimboeuf
2026-04-24 22:02 ` Song Liu
2026-04-23 4:03 ` [PATCH 30/48] objtool/klp: Handle Clang .data..Lanon anonymous data sections Josh Poimboeuf
2026-04-24 22:09 ` Song Liu
2026-04-23 4:03 ` [PATCH 31/48] objtool: Add is_alias_sym() helper Josh Poimboeuf
2026-04-23 8:35 ` Peter Zijlstra
2026-04-24 22:10 ` Song Liu
2026-04-23 4:04 ` [PATCH 32/48] objtool: Add is_cold_func() helper Josh Poimboeuf
2026-04-23 8:38 ` Peter Zijlstra
2026-04-23 15:12 ` Josh Poimboeuf
2026-04-23 15:14 ` Peter Zijlstra
2026-04-23 19:23 ` Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 33/48] objtool/klp: Extricate checksum calculation from validate_branch() Josh Poimboeuf
2026-04-24 22:14 ` Song Liu
2026-04-23 4:04 ` [PATCH 34/48] objtool: Consolidate file decoding into decode_file() Josh Poimboeuf
2026-04-23 8:41 ` Peter Zijlstra
2026-04-24 22:16 ` Song Liu
2026-04-23 4:04 ` [PATCH 35/48] objtool/klp: Add "objtool klp checksum" subcommand Josh Poimboeuf
2026-04-24 22:18 ` Song Liu
2026-04-23 4:04 ` [PATCH 36/48] klp-build: Use " Josh Poimboeuf
2026-04-24 22:24 ` Song Liu
2026-04-23 4:04 ` [PATCH 37/48] objtool/klp: Remove "objtool --checksum" Josh Poimboeuf
2026-04-24 22:25 ` Song Liu
2026-04-23 4:04 ` [PATCH 38/48] klp-build: Validate short-circuit prerequisites Josh Poimboeuf
2026-04-25 0:06 ` Song Liu
2026-04-28 16:19 ` Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 39/48] objtool: Replace iterator callbacks with for_each_sym_by_*() Josh Poimboeuf
2026-04-25 0:04 ` Song Liu
2026-04-28 16:14 ` Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 40/48] objtool/klp: Calculate object checksums Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 41/48] objtool/klp: Rewrite symbol correlation algorithm Josh Poimboeuf
2026-04-25 0:53 ` Song Liu
2026-04-28 16:23 ` Josh Poimboeuf
2026-04-28 20:50 ` Song Liu
2026-04-23 4:04 ` [PATCH 42/48] objtool/klp: Add correlation debugging output Josh Poimboeuf
2026-04-25 0:30 ` Song Liu
2026-04-23 4:04 ` [PATCH 43/48] objtool: Add insn_sym() helper Josh Poimboeuf
2026-04-23 8:45 ` Peter Zijlstra
2026-04-23 15:14 ` Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 44/48] objtool/klp: Fix position-dependent checksums for non-relocated jumps/calls Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 45/48] x86/Kconfig: Enable CONFIG_PREFIX_SYMBOLS for FineIBT Josh Poimboeuf
2026-04-23 8:47 ` Peter Zijlstra
2026-04-23 15:16 ` Josh Poimboeuf
2026-04-23 15:19 ` Peter Zijlstra
2026-04-23 16:23 ` Josh Poimboeuf
2026-04-23 16:29 ` Peter Zijlstra
2026-04-24 9:02 ` David Laight
2026-04-23 23:30 ` Josh Poimboeuf
2026-04-24 3:38 ` Josh Poimboeuf
2026-04-24 9:45 ` Peter Zijlstra
2026-04-27 17:17 ` Josh Poimboeuf
2026-04-28 1:37 ` David Laight [this message]
2026-04-28 16:25 ` Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 46/48] objtool/klp: Make function prefix handling more generic Josh Poimboeuf
2026-04-23 4:04 ` [PATCH 47/48] objtool: Improve and simplify prefix symbol detection Josh Poimboeuf
2026-04-23 8:55 ` Peter Zijlstra
2026-04-23 15:19 ` Josh Poimboeuf
2026-04-23 15:21 ` Peter Zijlstra
2026-04-23 4:04 ` [PATCH 48/48] objtool/klp: Cache dont_correlate() result Josh Poimboeuf
2026-04-25 1:19 ` Song Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260428023717.6a7c68c6@pumpkin \
--to=david.laight.linux@gmail.com \
--cc=joe.lawrence@redhat.com \
--cc=jpoimboe@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=live-patching@vger.kernel.org \
--cc=mbenes@suse.cz \
--cc=peterz@infradead.org \
--cc=pmladek@suse.com \
--cc=song@kernel.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox