mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-14 06:24:53 +08:00
52c9f93a9c
When building arm64 defconfig + CONFIG_LTO_CLANG_{FULL,THIN}=y after commit558c303c97
("arm64: Mitigate spectre style branch history side channels"), the following error occurs: <instantiation>:4:2: error: invalid fixup for movz/movk instruction mov w0, #ARM_SMCCC_ARCH_WORKAROUND_3 ^ Marc figured out that moving "#include <linux/init.h>" in include/linux/arm-smccc.h into a !__ASSEMBLY__ block resolves it. The full include chain with CONFIG_LTO=y from include/linux/arm-smccc.h: include/linux/init.h include/linux/compiler.h arch/arm64/include/asm/rwonce.h arch/arm64/include/asm/alternative-macros.h arch/arm64/include/asm/assembler.h The asm/alternative-macros.h include in asm/rwonce.h only happens when CONFIG_LTO is set, which ultimately casues asm/assembler.h to be included before the definition of ARM_SMCCC_ARCH_WORKAROUND_3. As a result, the preprocessor does not expand ARM_SMCCC_ARCH_WORKAROUND_3 in __mitigate_spectre_bhb_fw, which results in the error above. Avoid this problem by just avoiding the CONFIG_LTO=y __READ_ONCE() block in asm/rwonce.h with assembly files, as nothing in that block is useful to assembly files, which allows ARM_SMCCC_ARCH_WORKAROUND_3 to be properly expanded with CONFIG_LTO=y builds. Fixes:e35123d83e
("arm64: lto: Strengthen READ_ONCE() to acquire when CONFIG_LTO=y") Cc: <stable@vger.kernel.org> # 5.11.x Link: https://lore.kernel.org/r/20220309155716.3988480-1-maz@kernel.org/ Reported-by: Marc Zyngier <maz@kernel.org> Acked-by: James Morse <james.morse@arm.com> Signed-off-by: Nathan Chancellor <nathan@kernel.org> Link: https://lore.kernel.org/r/20220309191633.2307110-1-nathan@kernel.org Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
74 lines
2.0 KiB
C
74 lines
2.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Copyright (C) 2020 Google LLC.
|
|
*/
|
|
#ifndef __ASM_RWONCE_H
|
|
#define __ASM_RWONCE_H
|
|
|
|
#if defined(CONFIG_LTO) && !defined(__ASSEMBLY__)
|
|
|
|
#include <linux/compiler_types.h>
|
|
#include <asm/alternative-macros.h>
|
|
|
|
#ifndef BUILD_VDSO
|
|
|
|
#ifdef CONFIG_AS_HAS_LDAPR
|
|
#define __LOAD_RCPC(sfx, regs...) \
|
|
ALTERNATIVE( \
|
|
"ldar" #sfx "\t" #regs, \
|
|
".arch_extension rcpc\n" \
|
|
"ldapr" #sfx "\t" #regs, \
|
|
ARM64_HAS_LDAPR)
|
|
#else
|
|
#define __LOAD_RCPC(sfx, regs...) "ldar" #sfx "\t" #regs
|
|
#endif /* CONFIG_AS_HAS_LDAPR */
|
|
|
|
/*
|
|
* When building with LTO, there is an increased risk of the compiler
|
|
* converting an address dependency headed by a READ_ONCE() invocation
|
|
* into a control dependency and consequently allowing for harmful
|
|
* reordering by the CPU.
|
|
*
|
|
* Ensure that such transformations are harmless by overriding the generic
|
|
* READ_ONCE() definition with one that provides RCpc acquire semantics
|
|
* when building with LTO.
|
|
*/
|
|
#define __READ_ONCE(x) \
|
|
({ \
|
|
typeof(&(x)) __x = &(x); \
|
|
int atomic = 1; \
|
|
union { __unqual_scalar_typeof(*__x) __val; char __c[1]; } __u; \
|
|
switch (sizeof(x)) { \
|
|
case 1: \
|
|
asm volatile(__LOAD_RCPC(b, %w0, %1) \
|
|
: "=r" (*(__u8 *)__u.__c) \
|
|
: "Q" (*__x) : "memory"); \
|
|
break; \
|
|
case 2: \
|
|
asm volatile(__LOAD_RCPC(h, %w0, %1) \
|
|
: "=r" (*(__u16 *)__u.__c) \
|
|
: "Q" (*__x) : "memory"); \
|
|
break; \
|
|
case 4: \
|
|
asm volatile(__LOAD_RCPC(, %w0, %1) \
|
|
: "=r" (*(__u32 *)__u.__c) \
|
|
: "Q" (*__x) : "memory"); \
|
|
break; \
|
|
case 8: \
|
|
asm volatile(__LOAD_RCPC(, %0, %1) \
|
|
: "=r" (*(__u64 *)__u.__c) \
|
|
: "Q" (*__x) : "memory"); \
|
|
break; \
|
|
default: \
|
|
atomic = 0; \
|
|
} \
|
|
atomic ? (typeof(*__x))__u.__val : (*(volatile typeof(__x))__x);\
|
|
})
|
|
|
|
#endif /* !BUILD_VDSO */
|
|
#endif /* CONFIG_LTO && !__ASSEMBLY__ */
|
|
|
|
#include <asm-generic/rwonce.h>
|
|
|
|
#endif /* __ASM_RWONCE_H */
|