-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC: patchable-function-entry #3543
Changes from all commits
83aa13b
f0d3599
3b8eb1a
0b0e428
aafb1d3
b5cb2f1
8aaa21a
6d1b0a2
5c3fd16
eb061c9
b895311
d6200f7
8b925c5
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,269 @@ | ||
- Feature Name: `patchable_function_entry` | ||
- Start Date: 2023-12-12 | ||
- RFC PR: [rust-lang/rfcs#3543](https://github.com/rust-lang/rfcs/pull/3543) | ||
- Tracking Issue: [rust-lang/rust#123115](https://github.com/rust-lang/rust/issues/123115) | ||
|
||
# Summary | ||
[summary]: #summary | ||
|
||
This RFC proposes support for `patchable-function-entry` as present in [`clang`](https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fpatchable-function-entry) and [`gcc`](https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html#index-fpatchable-function-entry). This feature is generally used to allow hotpatching and instrumentation of code. | ||
|
||
# Motivation | ||
[motivation]: #motivation | ||
|
||
The Linux kernel uses `-fpatchable-function-entry` heavily, including for [`ftrace`](https://www.kernel.org/doc/html/v6.6/trace/ftrace.html) and [`FINEIBT` for x86](https://github.com/torvalds/linux/blob/26aff849438cebcd05f1a647390c4aa700d5c0f1/arch/x86/Kconfig#L2464). Today, enabling these features alongside Rust will lead to confusing or broken behavior (`ftrace` will fail to trace Rust functions when developing, `FINEIBT` will conflict with the `kcfi` sanitizer, etc.). It also uses the `clang` and `gcc` attribute `patchable_function_entry` to disable this padding on fragile functions or those used for instrumentation. | ||
|
||
Integrating Rust code into this and other large projects which expect all native code to have these nop buffers will be made easier by allowing them to request the same treatment of native functions they get in C and C++. | ||
|
||
# Guide-level explanation | ||
[guide-level-explanation]: #guide-level-explanation | ||
|
||
`patchable-function-entry` provides configurable nop padding before function symbols and after function symbols but before any generated code. We refer to the former as `prefix` padding and the latter as `entry` padding. For example, if we had a function `f` with `prefix_nops` set to 3 and `entry_nops` to 2, we'd expect to see: | ||
|
||
``` | ||
nop | ||
nop | ||
nop | ||
f: | ||
nop | ||
nop | ||
// Code goes here | ||
``` | ||
|
||
To set this for all functions in a crate, use `-C patchable-function-entry=total_nops=m,prefix_nops=n` where `total_nops = prefix_nops + entry_nops`. Usually, you'll want to copy this value from a corresponding `-fpatchable-function-entry=` being passed to the C compiler in your project - `total_nops` will match the first parameter used by your C compiler, and the optional `offset` parameter passed to the C compiler will match `prefix_nops`. | ||
|
||
To set this for a specific function, use `#[patchable_function_entry(prefix_nops = m, entry_nops = n)]` to pad with m nops before the symbol and n after the symbol, but before the prelude. This will override the flag value. To disable padding for a specific function, for example because it is part of the instrumentation framework, use `#[patchable_function_entry(entry_nops = 0, prefix_nops = 0)]`. | ||
|
||
# Reference-level explanation | ||
[reference-level-explanation]: #reference-level-explanation | ||
|
||
`patchable-function-entry` provides configurable nop padding before function symbols and after function symbols but before any generated code. We refer to the former as `prefix` padding and the latter as `entry` padding. For example, if we had a function `f` with `prefix_nops` set to 3 and `entry_nops` to 2, we'd expect to see: | ||
|
||
``` | ||
f_pad: | ||
nop | ||
nop | ||
nop | ||
f: | ||
nop | ||
nop | ||
// Code goes here | ||
``` | ||
|
||
Nop padding may not be supported on all architectures. As of the time of writing, support includes: | ||
|
||
- aarch64 | ||
- aarch64\_be | ||
- loongarch32 | ||
- loongarch64 | ||
- riscv32 | ||
- riscv64 | ||
- i686 | ||
- x86\_64 | ||
|
||
`f_pad` addresses for every padded symbol are aggregated in the `__patchable_function_entries` section of the resulting object. | ||
This is not a real symbol, just a collected location. | ||
|
||
## Compiler flag `-C patchable-function-entry` | ||
|
||
This flag comes in two forms: | ||
|
||
- `-C patchable-function-entry=total_nops=m,prefix_nops=n` | ||
- `-C patchable-function-entry=total_nops=m` | ||
|
||
In the latter, `prefix_nops` is assumed to be zero. `total_nops` must be greater than or equal to `prefix_nops`, or it will be rejected. | ||
|
||
If unspecified, the current behavior is maintained, which is equivalent to `total_nops=0` here. | ||
|
||
This flag sets the default nop padding for all functions in the crate. In most cases, all crates in a compilation should use the same value of `-C patchable-function-entry` to reduce confusion. If not all crates in the compilation graph share the same `patchable-function-entry` configuration, the compiler may produce an error *or* use any patchability specification present in the graph as the default for any function. | ||
|
||
`entry_nops` is calculated as `total_nops - prefix_nops`. This unusual mode of specification is intended to mimic the compiler flags of `clang` and `gcc` for ease of build system integration. The first mandatory parameter to their flags matches `total_nops`, and the optional parameter matches `prefix_nops`. | ||
|
||
Specifying the compiler flag for a backend or architecture which does not support this feature will result in an error. Some backend / architecture combinations may only support some values of `entry_nops` and `prefix_nops`, in which case an error will also be generated for invalid values. | ||
|
||
## Attribute `#[patchable_function_entry]` | ||
|
||
This attribute allows specification of either the `prefix_nops` or `entry_nops` values or both, using the format `#[patchable_function_entry(prefix_nops = m, entry_nops = n)]`. If either is left unspecified, it overrides them to a default value of 0. Specifying neither `prefix_nops` nor `entry_nops` is an error, but explicitly setting them both to 0 is allowed. | ||
|
||
As this is specified via an attribute, it will persist across crate boundaries unlike the compiler flag. | ||
|
||
Specifying any amount of padding other than 0 in an attribute will result in an error on backends or architectures which do not support this feature. Some architecture/backend combinations may only support a subset of prefix and entry nop counts, and may generate errors when other counts are requested. | ||
|
||
## Optimization Notes | ||
|
||
Neither `#[patchable]` nor `-C patchable-function-entry` imply any restriction on inlining by themselves. If it is critical that patched code in the `entry` section be executed on *every* function invocation, not only in an advisory capacity, annotate the relevant functions with `#[inline(never)]` in addition. | ||
|
||
# Drawbacks | ||
[drawbacks]: #drawbacks | ||
|
||
Not currently aware of any other than the complexity that comes from adding anything. | ||
|
||
# Rationale and alternatives | ||
[rationale-and-alternatives]: #rationale-and-alternatives | ||
|
||
## Implementation Levels | ||
### Status Quo | ||
If we keep to the status quo, we need to go through the Linux kernel making Rust support disable a variety of features which depend on this codegen feature. While I have not taken a complete inventory, this includes debugging features (e.g. `ftrace`) and hardening features (e.g. `FINEIBT`). | ||
|
||
This alternative runs the risk of the Rust-for-Linux experiment not leaving experiment status, and similar systems with introspection considering Rust unsuitable. | ||
|
||
The primary advantage of this design is that it does not require us to do anything. | ||
|
||
### Only compiler flag | ||
In this design, we only add the `-C patchable-function-entry` flag and not the attribute. This is enough for today - it would allow Rust to participate in these schemes, and in the event that a user *deeply* needed an uninstrumented function, they could build it as a separate crate. | ||
|
||
This design has two drawbacks: | ||
|
||
- It requires users to artificially structure their code as a form of annotation. | ||
- The caveats around polymorphic functions using their codegen environment's flags could be tricky or surprising. | ||
|
||
The primary advantage of this design is that it is purely a compiler feature, with no change to the language. | ||
|
||
### Compiler flag and no-padding attribute | ||
In this design, we add the compiler flag and an attribute that zeroes out padding for a function. This covers all the use cases I see in the Linux kernel today, so the only real downside is missing the opportunity to match `gcc` and `clang`'s capabilities with only a small bit more code. | ||
|
||
Some other project might use explicit padding configuration per-function, but a quick search across github only finds the `patchable_function_entry` attribute set to `(0, 0)` other than in compiler tests. | ||
|
||
### Everything (proposed design) | ||
The only real downside I see here is the complexity of adding one more thing to the language. | ||
|
||
## Argument style | ||
|
||
There are two basic ways being used today to specify this nop padding: | ||
|
||
- `nop_count`,`offset`, used by the attributes and flags in `gcc` and `clang`. | ||
- `prefix`, `entry`, used by the *LLVM* attributes after translation from the language level attributes and flags. | ||
|
||
The primary advantage of the first format is that it is used in `gcc` and `clang`. This means that existing documentation will not mislead users and tooling will have an easier time feeding the correct flag to Rust. | ||
|
||
The advantage of the second style is that `prefix` and `entry` don't have validity constraints (`nop_count` must be greater than `offset`) and it's more obvious what the user is asking for. | ||
|
||
### Copy `gcc`/`clang` everywhere | ||
|
||
This approach has the advantage of matching all existing docs and programmers coming over not being confused. | ||
|
||
### Use LLVM-style everywhere | ||
|
||
This format doesn't require validation and is likely easier to understand for users not already exposed to this concept. | ||
|
||
### Use `gcc`/`clang` for flags, LLVM-style for arguments (proposed) | ||
|
||
Build systems tend to interact with our flag interface, and they already have `nop_count,offset` format flags constructed for their C compilers, so this is likely the easiest way for them to interface. | ||
|
||
Users are unlikely to be directly copying code with a manual attribute, and usually are just going to be disabling padding per a github search for the attribute. Setting padding to `(0, 0)` is compatible across both styles, and setting `prefix` and `entry` manually is likely to be more understandable for a new user. | ||
|
||
### Use `gcc`/`clang` for flags, Support both styles for arguments | ||
|
||
Our attribute system is more powerful than `clang` and `gcc`, so we have the option to support: | ||
|
||
- `prefix = n` | ||
- `entry = n` | ||
- `nop_count = n` | ||
- `offset = n` | ||
|
||
as modifiers to the attribute. We could make `prefix`/`entry` vs `nop_count`/`offset` an exclusive choice, and support both. This would provide the advantage of allowing users copying from or familiar with the other specification system to continue using it. The disadvantages would be more complex attribute parsing and potential confusion for people reading code. | ||
|
||
### Support both styles for flags and arguments | ||
|
||
In addition to supporting `nop_count`/`offset` for attributes, we could support this on the command line as well. This would have two forms: | ||
|
||
- `-C patchable-function-entry=nop_count=m,offset=n` (`nop_count=m`, `offset=n`, modern format, offset optional) | ||
- `-C patchable-function-entry=prefix=m,entry=n` (`prefix=m`, `entry=n`, modern format, either optional) | ||
|
||
This would have the benefit of making it more clear what's being specified and allowing users to employ the simpler format on the command line if not integrating with an existing build. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Another benefit is that it would allow a potential design choice of There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The counterpoint here is that If we support both styles, then specifying just one could be nice, since |
||
|
||
The primary disadvantage of this is having many ways to say the same thing. | ||
|
||
### Use LLVM-style for flags, `gcc`/`clang` for arguments | ||
|
||
I'm not sure why we would do this. | ||
|
||
## Inlining | ||
|
||
Inlining a function will prevent code in the `entry` patchable section from being executed. This raises the question of whether we should suppress or lint about inlining around this attribute or flag. | ||
|
||
Existing support in `gcc` and `clang` does not suppress inlining at all, but `rustc` makes much heavier use of inlining than they do by default, making it possible that we might want to make a different call. | ||
|
||
Linux's usage of this flag does not consider inlining suppression to be desirable. The two primary usages are: | ||
|
||
- Hardening, where only indirect calls are considered, and so inlining is a non-issue | ||
- Tracing, where inlined calls are explicitly out of scope, and `noinline` is already explicitly added to C code which should be traced. | ||
|
||
Possible signals we could consider include beyond whether any padding is present: | ||
|
||
- Whether the `entry` padding is nonzero, not considering `prefix` - `prefix` padding would not be executed by a direct call anyways | ||
- Whether the padding was specified by an attribute or a flag | ||
- Whether an explicit inlining annotation is present | ||
|
||
Possible actions we could take include: | ||
|
||
- Nothing | ||
- Warning/linting | ||
- Suppress inlining implicitly | ||
|
||
Since we don't have a way to "reset" inlining to default, any plan involving suppression of inlining also needs to come with additional configuration to suppress the suppression. | ||
|
||
### Inline suppresssion | ||
If the function has nonzero `entry` padding, prevent inlining. | ||
|
||
Add `-C allow-patchable-function-inlining` to disable this behavior. | ||
|
||
Add `#[patchable(inlinable = yes)]` to suppress inline suppression in the attribute. | ||
|
||
The advantage of this approach is that any instrumentation will always trigger when the function is called. | ||
|
||
Disadvantages: | ||
|
||
- When the flag is passed, we will disable inlining *nearly everywhere*. This would be disasterous for performance, given the number of functions Rust depends on inlining to optimize. | ||
- This does not match C/C++ behavior, which means most existing use cases will be surprised. | ||
- We need to add flag complexity to match existing use cases. | ||
|
||
We could mitigate a portion of the disadvantages of this approach by only suppressing for the attribute rather than the flag. This would prevent the use of a flag to trace all function invocations. | ||
|
||
### Lint on attribute | ||
If the function has nonzero `entry` padding specified via attribute, and `#[inline]` is not explicitly set, trigger a lint. | ||
|
||
Use `#[allow]` to accept the inlinability, the same as any other lint. | ||
|
||
The advantage of this approach is that if the attribute is explicitly set, it will surface to the user to think about inlining. By using a lint, we avoid introducing new syntax, allow it to be ignored crate-wide if needed, and avoid user surprise. | ||
|
||
Disadvantages: | ||
|
||
- There are no instances of the C/C++ side variants of this attribute in the wild being used with nonzero entry padding, so we don't know if this behavior would actually be unexpected. | ||
- There is no way for a user to use load-bearing entry padding on the whole program without annotating every function. | ||
- The user would not be informed when patchability was triggered via a compilation flag. | ||
|
||
### Do not suppress inlining (proposed) | ||
Take no action on inlining other than mentioning it in the reference. | ||
|
||
This approach mirrors what C/C++ does today. It doesn't close the door on taking the lint approach in the future, but we wouldn't be able to do suppression in the future without reversing the sense of the extra flags. | ||
|
||
Disadvantages: | ||
|
||
- There is no way for a user to use load-bearing entry padding on the whole program without annotating every function. | ||
- Users not familiar with the C/C++ usage of the flag might be surprised when Rust's more aggressive inlining fails to run an `entry` prelude in some scenarios. | ||
|
||
# Prior art | ||
[prior-art]: #prior-art | ||
|
||
- Linux uses this flag and attribute extensively | ||
- `clang` [implements the flag](https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fpatchable-function-entry) | ||
- `clang` [implements the attribute](https://clang.llvm.org/docs/AttributeReference.html#patchable-function-entry) | ||
- `gcc` [implements the flag](https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html#index-fpatchable-function-entry) | ||
- `gcc` [implements the attribute](https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-patchable_005ffunction_005fentry-function-attribute) | ||
|
||
# Unresolved questions | ||
[unresolved-questions]: #unresolved-questions | ||
|
||
- Should we use LLVM or `gcc`/`clang` style for a per-function attribute? Should we support both styles? | ||
- Should we support a more explicit command line argument style? | ||
- Should we reject linking crates with different default padding configurations? | ||
|
||
# Future possibilities | ||
[future-possibilities]: #future-possibilities | ||
|
||
We could potentially use these for dynamic tracing of rust programs, similar to `#[instrument]` in the `tracing` crate today, but with more configurable behavior and even lower overhead (since there will be no conditionals to check, just a nop sled to go down). | ||
|
||
We could consider adding `#[unpatchable]` as a shorthand for `#[patchable_function_entry(entry_nops = 0, prefix-nops = 0)]`. | ||
|
||
We could define the behavior around differing default patchability in the crate graph more narrowly (either require a hard error, or require that the compiler follows the declaring crate's padding spec). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Until this point I was under an impression that this is a pretty trivial feature and that there shouldn’t be any major reasons why it wouldn't be supported for an architecture. Is this entirely an engineering resource issue on the backend side?
The RFC should specify how we’ll handle unsupported platforms (do we need to make it stable on a per-architecture basis? Similar to
#[target_feature(enable=...)]
flag?) I guess we also need to account for backends like cranelift which might not support the patchable entry feature at all...EDIT: ah, I see you mentioned errors below.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My understanding is that it's an engineering issue for most architectures/backends. For example, I don't think wasm can meaningfully do this.
The listed supported architectures are based on what LLVM currently supports.