From patchwork Fri May 7 22:07:52 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 432147 Delivered-To: patch@linaro.org Received: by 2002:a02:c901:0:0:0:0:0 with SMTP id t1csp704617jao; Fri, 7 May 2021 15:11:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKjrvpMZLdNXXJeRywElSkeGdNkO0UL8/NGvGA9GAmOh2bUqgPT0SuOi9CX1fvcgd3YRB4 X-Received: by 2002:a17:907:7355:: with SMTP id dq21mr12524737ejc.157.1620425489129; Fri, 07 May 2021 15:11:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620425489; cv=none; d=google.com; s=arc-20160816; b=xczvGxIQBBx+lHqVa2L3IEmmXQHvUb5v71ckiVuF/yU/uetZmP7v+fIat7DPre3PaR G5HGMvWUUAPDCawqffigSwzUlKPzsrkbxpZBJvFZ/tbzQxchdZYMkRRu+1H31Xf+1t/2 2sZ4C78GkMS+lMUdRYupq1sdjXj36CzjbHX49t3DAMwrzB6FnqJC4CQfRvvKUOgNUH7O bq8IZ1MzIg83IbkZyYyUmMYpzyxjhYt+ShqxU/98RsmwEH62WDFwVEjvPG+q9iLi8Iyd txiLE7GKiKxFKYy2/T41jUyv+ywiLt0NO6Fmy56wxyIFrzOJy0o5oxAtT/YSrOfh2WGr UR3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5nIxAfEsUkj2Iul5httBsrBSXZpCtUowrln+PGXEL60=; b=l4tfVPN/c7nofcq0vpUVEK6o2Pm2MZjYrPaR4xIIy2kyR8JYk5D8UaBKiEV1LwZn9E pCqLb24hjXSngY/oJzVaun2TV229ImoMFATyN+zrVmw2gBYLngXTfB5apVCdqYRr1+Vt plwtoTWiy54OgkwdwCHJpfi24mwh6LuR2WudxiIRwcsy1c4j5FCHBS7HmGvFNPeFMG/A KFCzaQKKDpqBMIqW4NLYrtvjD6hJltfMeX1wuicSXM5vuTp16huOmLD/lAwJej/faS6M V2RaU9/VA0TdpGiZd2vMZ9Thd8YrqP/BWHJ6Da/0QAZUmsjpkYm7Zrv3MbiyjSe0lcD+ 7ngQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mdxBHSXb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s24si6312249ejz.169.2021.05.07.15.11.28; Fri, 07 May 2021 15:11:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mdxBHSXb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229819AbhEGWM1 (ORCPT + 3 others); Fri, 7 May 2021 18:12:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:58896 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229713AbhEGWM1 (ORCPT ); Fri, 7 May 2021 18:12:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C707761157; Fri, 7 May 2021 22:11:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620425487; bh=/1/UOIWYPn5kTgiSiyWVzm4Z1WNjAYR3GXsRt8d07s8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mdxBHSXbZGh610xS0FF+osRCTW+mIxD8lfa3TIlAAzehIGr3CK7mjH6fFNaW8pnLT VmBgHLsVEShQxz2UHsaO8ECgg+bc3252dQbGDjCr0tWRoLBON39UPYHlReqQk5t+HM X87S8V8DLQEEpxJYV9ijxeeH0eDYfsAAIML+XMfK9PlCIenMHvlSBwVzxZOcQvsMr1 KnIvpczf0x2/RFGBXZL5dL/9r0UbNlVEiJZ7yJau3AcwdG0/zdc7iVWrfyY/gYO30x Pj6efwHMiXv4gXWil/90RZwzdgseoPDH7p6QFMb9FNpytAdXJZuMtlDGcwBwQtguaY JEuXigjLSgLoQ== From: Arnd Bergmann To: linux-arch@vger.kernel.org Cc: Linus Torvalds , Vineet Gupta , Arnd Bergmann , Russell King , Herbert Xu , "David S. Miller" , Thomas Bogendoerfer , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, linux-mips@vger.kernel.org Subject: [RFC 07/12] asm-generic: unaligned always use struct helpers Date: Sat, 8 May 2021 00:07:52 +0200 Message-Id: <20210507220813.365382-8-arnd@kernel.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20210507220813.365382-1-arnd@kernel.org> References: <20210507220813.365382-1-arnd@kernel.org> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Arnd Bergmann As found by Vineet Gupta and Linus Torvalds, gcc has somewhat unexpected behavior when faced with overlapping unaligned pointers. The kernel's unaligned/access-ok.h header technically invokes undefined behavior that happens to usually work on the architectures using it, but if the compiler optimizes code based on the assumption that undefined behavior doesn't happen, it can create output that actually causes data corruption. A related problem was previously found on 32-bit ARMv7, where most instructions can be used on unaligned data, but 64-bit ldrd/strd causes an exception. The workaround was to always use the unaligned/le_struct.h helper instead of unaligned/access-ok.h, in commit 1cce91dfc8f7 ("ARM: 8715/1: add a private asm/unaligned.h"). The same solution should work on all other architectures as well, so remove the access-ok.h variant and use the other one unconditionally on all architectures, picking either the big-endian or little-endian version. With this, the arm specific header can be removed as well, and the only file including linux/unaligned/access_ok.h gets moved to including the normal file. Fortunately, this made almost no difference to the object code produced by gcc-11. On x86, s390, powerpc, and arc, the resulting binary appears to be identical to the previous version, while on arm64 and m68k there are minimal differences that looks like an optimization pass went into a different direction, usually using fewer stack spills on the new version. Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100363 Signed-off-by: Arnd Bergmann --- arch/arm/include/asm/unaligned.h | 25 ----------- arch/mips/crypto/crc32-mips.c | 2 +- include/asm-generic/unaligned.h | 13 +----- include/linux/unaligned/access_ok.h | 68 ----------------------------- 4 files changed, 3 insertions(+), 105 deletions(-) delete mode 100644 arch/arm/include/asm/unaligned.h delete mode 100644 include/linux/unaligned/access_ok.h -- 2.29.2 diff --git a/arch/arm/include/asm/unaligned.h b/arch/arm/include/asm/unaligned.h deleted file mode 100644 index 3c5248fb4cdc..000000000000 --- a/arch/arm/include/asm/unaligned.h +++ /dev/null @@ -1,25 +0,0 @@ -#ifndef __ASM_ARM_UNALIGNED_H -#define __ASM_ARM_UNALIGNED_H - -/* - * We generally want to set CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS on ARMv6+, - * but we don't want to use linux/unaligned/access_ok.h since that can lead - * to traps on unaligned stm/ldm or strd/ldrd. - */ -#include - -#if defined(__LITTLE_ENDIAN) -# include -# include -# define get_unaligned __get_unaligned_le -# define put_unaligned __put_unaligned_le -#elif defined(__BIG_ENDIAN) -# include -# include -# define get_unaligned __get_unaligned_be -# define put_unaligned __put_unaligned_be -#else -# error need to define endianess -#endif - -#endif /* __ASM_ARM_UNALIGNED_H */ diff --git a/arch/mips/crypto/crc32-mips.c b/arch/mips/crypto/crc32-mips.c index faa88a6a74c0..0a03529cf317 100644 --- a/arch/mips/crypto/crc32-mips.c +++ b/arch/mips/crypto/crc32-mips.c @@ -8,13 +8,13 @@ * Copyright (C) 2018 MIPS Tech, LLC */ -#include #include #include #include #include #include #include +#include #include diff --git a/include/asm-generic/unaligned.h b/include/asm-generic/unaligned.h index d79df721ae60..36bf03aaa674 100644 --- a/include/asm-generic/unaligned.h +++ b/include/asm-generic/unaligned.h @@ -8,22 +8,13 @@ */ #include -/* Set by the arch if it can handle unaligned accesses in hardware. */ -#ifdef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS -# include -#endif - #if defined(__LITTLE_ENDIAN) -# ifndef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS -# include -# endif +# include # include # define get_unaligned __get_unaligned_le # define put_unaligned __put_unaligned_le #elif defined(__BIG_ENDIAN) -# ifndef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS -# include -# endif +# include # include # define get_unaligned __get_unaligned_be # define put_unaligned __put_unaligned_be diff --git a/include/linux/unaligned/access_ok.h b/include/linux/unaligned/access_ok.h deleted file mode 100644 index 167aa849c0ce..000000000000 --- a/include/linux/unaligned/access_ok.h +++ /dev/null @@ -1,68 +0,0 @@ -/* SPDX-License-Identifier: GPL-2.0 */ -#ifndef _LINUX_UNALIGNED_ACCESS_OK_H -#define _LINUX_UNALIGNED_ACCESS_OK_H - -#include -#include - -static __always_inline u16 get_unaligned_le16(const void *p) -{ - return le16_to_cpup((__le16 *)p); -} - -static __always_inline u32 get_unaligned_le32(const void *p) -{ - return le32_to_cpup((__le32 *)p); -} - -static __always_inline u64 get_unaligned_le64(const void *p) -{ - return le64_to_cpup((__le64 *)p); -} - -static __always_inline u16 get_unaligned_be16(const void *p) -{ - return be16_to_cpup((__be16 *)p); -} - -static __always_inline u32 get_unaligned_be32(const void *p) -{ - return be32_to_cpup((__be32 *)p); -} - -static __always_inline u64 get_unaligned_be64(const void *p) -{ - return be64_to_cpup((__be64 *)p); -} - -static __always_inline void put_unaligned_le16(u16 val, void *p) -{ - *((__le16 *)p) = cpu_to_le16(val); -} - -static __always_inline void put_unaligned_le32(u32 val, void *p) -{ - *((__le32 *)p) = cpu_to_le32(val); -} - -static __always_inline void put_unaligned_le64(u64 val, void *p) -{ - *((__le64 *)p) = cpu_to_le64(val); -} - -static __always_inline void put_unaligned_be16(u16 val, void *p) -{ - *((__be16 *)p) = cpu_to_be16(val); -} - -static __always_inline void put_unaligned_be32(u32 val, void *p) -{ - *((__be32 *)p) = cpu_to_be32(val); -} - -static __always_inline void put_unaligned_be64(u64 val, void *p) -{ - *((__be64 *)p) = cpu_to_be64(val); -} - -#endif /* _LINUX_UNALIGNED_ACCESS_OK_H */