Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp78631ybt; Tue, 30 Jun 2020 15:13:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzo9G7k2agQBi46GcwAkGS7fe4eZPYnwTytC8hMys9yC7nHN4s9zaxc/ylUs4Ka9ckUdd+m X-Received: by 2002:a17:906:3e13:: with SMTP id k19mr19722380eji.476.1593554833715; Tue, 30 Jun 2020 15:07:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593554833; cv=none; d=google.com; s=arc-20160816; b=tjKInxkftsJfvyAX32UTse1Rvrkfk1922ExVt6Bl4YvPJ2C53gO6T4O8luARjEX6Xe NvV4QOR2hZheE0Mf1y7EJXUVnRJxfZwiehNLPnYbKiDgvcOWlPJKQIkvBjutRyWzrzv2 vWvW5hgzuo8QCmRN718CD7zUNIXuJy4bd5nCsriV1MKcQk/+KgwoVuMyhWYt7jyxf1Ev rpFP8Ntimd4eFGUt2wX0STCSauQKri7IWVkmr0NwG+v1bxUq2mXmuwNl7rqVI7BmUe+7 rnSZj/fn8t0YuFxdp3GLvOCLdRkFw6E5Ev2q5f6eF1BzOWqS8tTJA+U7VP4CFp5EZkta 2X5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=JRbK+0YHHIIsxTnbZ87llwjlpqpRQpEg9t8681tVnaU=; b=mCfrQOOtDl/3ZWE+bp+6zlrhY9TsTJMPRy8V4E/2gdbvkLON32xR89u2qzdcwKIZ59 NlLNSsZnSorLE2WU9njtihhjcuGYULyurAnW+L8T9wuGTWILE4VS6HBZmAShMLV0JQHU Db5nJcRic7g463lRPccGiJjx+WEQ26t2/qOHAYR/quIwqPHC1GO9lMoDXDx+Uvt9Kdlu Ulghy9J0w/MGcIpp9V8RqS6PX5Vz1bFl34jen/57hyVBWcai6MWk7OO1ShiT/IUfCaTH pcygssEYGfdxCOOn8n7wZBVaJJjJr2M/027Ltuj1qcpyYnu2s39hbHRHvMOX8qRp4Tzx IuoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=P1jN7hrT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h21si2589253ejb.246.2020.06.30.15.06.49; Tue, 30 Jun 2020 15:07:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=P1jN7hrT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726151AbgF3WGo (ORCPT + 99 others); Tue, 30 Jun 2020 18:06:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39746 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726074AbgF3WGo (ORCPT ); Tue, 30 Jun 2020 18:06:44 -0400 Received: from mail-pj1-x1042.google.com (mail-pj1-x1042.google.com [IPv6:2607:f8b0:4864:20::1042]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 444F6C061755 for ; Tue, 30 Jun 2020 15:06:44 -0700 (PDT) Received: by mail-pj1-x1042.google.com with SMTP id i4so10112740pjd.0 for ; Tue, 30 Jun 2020 15:06:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=JRbK+0YHHIIsxTnbZ87llwjlpqpRQpEg9t8681tVnaU=; b=P1jN7hrTy263FT44RDpDA65u3Rpzfknem+XD+OMM/9oElVw4mULSi4D0lEO0eRmOKF Jpl22NVra0Z4yS6qM/4cEqrsqHE11VDz0LW/TJdwENjM1XKwAxuc/zx6jHtYKPYVcPNc bJ7DBiyCYCw9FVrxk51YTI/1Jr9v5yYigqgM/V/5y6GrMWXfD1H5uF9L+FlTvRT/dgtf J9wm9fmOxRDyaq52BfrTDqEBgkYyr7pErzDIR0IPGZIoHHi/1vmIek/VZuJjyz9UlOxn W8TJsKUJJGU5n71KbMM76zZ4x8usO3ozwR7Kp/9dVjoMdwJpAkFF0Wgl3Wv5kKl6u8NI el8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=JRbK+0YHHIIsxTnbZ87llwjlpqpRQpEg9t8681tVnaU=; b=W8QlVARmdLl3goydo3Ldaduklw2+lZtXC9XGhIeN38qUay9yAp8eDsg7w6fi68cgxi UsSsk5d1LM3hS0bra2dZImCx8ibQiQI1pEUIkJuIWMjC1OgV0nZnUxK0il4mQVp9Egmi Fmo2+4gK5Q0O8WNrgi3aqt0w6DArR8romAbq153TjzRlgsbSWBqEZlIh+XD9onA7CjjM tN732zIB6sGvhJHwOyd8sXTbKD3ujvvcv8Gbkmse/N9o9K5r5cjzNUEShlKB4F11wvd1 IiKjKrZKXkyZ8lYV+wGbauC3E0Z0ZvplfXyenFq46io2R2JksErCQQT+ILrqsvIATU0P 1htA== X-Gm-Message-State: AOAM53368wqH/f8njQrI4Kbd6AVsGseUqcBUPlhMEZhL9lx5c9x/HN2u pqAexjhhk/S9ebHwTP4eG+SBM4EpnmnJ5Q== X-Received: by 2002:a17:902:c697:: with SMTP id r23mr9815458plx.35.1593554447222; Tue, 30 Jun 2020 15:00:47 -0700 (PDT) Received: from google.com ([2620:15c:2ce:0:a6ae:11ff:fe11:4abb]) by smtp.gmail.com with ESMTPSA id s131sm3658364pgc.30.2020.06.30.15.00.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jun 2020 15:00:46 -0700 (PDT) Date: Tue, 30 Jun 2020 15:00:43 -0700 From: Fangrui Song To: Arvind Sankar , Ard Biesheuvel Cc: Kees Cook , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , X86 ML , Nick Desaulniers , Dmitry Golovin , clang-built-linux , Masahiro Yamada , Daniel Kiper , Sedat Dilek , Nathan Chancellor , Arnd Bergmann , "H . J . Lu" , Linux Kernel Mailing List Subject: Re: [PATCH v3 7/7] x86/boot: Check that there are no runtime relocations Message-ID: <20200630220043.4snabunhgvfdktte@google.com> References: <20200629140928.858507-8-nivedita@alum.mit.edu> <202006290907.E5EF18A@keescook> <202006290919.93C759C62@keescook> <20200629165603.GD900899@rani.riverdale.lan> <20200629173735.l3ssrj7m3q5swfup@google.com> <20200629233405.n56yb4xwlgxrt3fn@google.com> <20200630175408.GA2301688@rani.riverdale.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20200630175408.GA2301688@rani.riverdale.lan> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Ard Biesheuvel > On Tue, 30 Jun 2020 at 01:34, Fangrui Song wrote: > > > > On 2020-06-29, Ard Biesheuvel wrote: > > >On Mon, 29 Jun 2020 at 19:37, Fangrui Song wrote: > > >> > > >> On 2020-06-29, Arvind Sankar wrote: > > >> >On Mon, Jun 29, 2020 at 09:20:31AM -0700, Kees Cook wrote: > > >> >> On Mon, Jun 29, 2020 at 06:11:59PM +0200, Ard Biesheuvel wrote: > > >> >> > On Mon, 29 Jun 2020 at 18:09, Kees Cook wrote: > > >> >> > > > > >> >> > > On Mon, Jun 29, 2020 at 10:09:28AM -0400, Arvind Sankar wrote: > > >> >> > > > Add a linker script check that there are no runtime relocations, and > > >> >> > > > remove the old one that tries to check via looking for specially-named > > >> >> > > > sections in the object files. > > >> >> > > > > > >> >> > > > Drop the tests for -fPIE compiler option and -pie linker option, as they > > >> >> > > > are available in all supported gcc and binutils versions (as well as > > >> >> > > > clang and lld). > > >> >> > > > > > >> >> > > > Signed-off-by: Arvind Sankar > > >> >> > > > Reviewed-by: Ard Biesheuvel > > >> >> > > > Reviewed-by: Fangrui Song > > >> >> > > > --- > > >> >> > > > arch/x86/boot/compressed/Makefile | 28 +++----------------------- > > >> >> > > > arch/x86/boot/compressed/vmlinux.lds.S | 8 ++++++++ > > >> >> > > > 2 files changed, 11 insertions(+), 25 deletions(-) > > >> >> > > > > >> >> > > Reviewed-by: Kees Cook > > >> >> > > > > >> >> > > question below ... > > >> >> > > > > >> >> > > > diff --git a/arch/x86/boot/compressed/vmlinux.lds.S b/arch/x86/boot/compressed/vmlinux.lds.S > > >> >> > > > index a4a4a59a2628..a78510046eec 100644 > > >> >> > > > --- a/arch/x86/boot/compressed/vmlinux.lds.S > > >> >> > > > +++ b/arch/x86/boot/compressed/vmlinux.lds.S > > >> >> > > > @@ -42,6 +42,12 @@ SECTIONS > > >> >> > > > *(.rodata.*) > > >> >> > > > _erodata = . ; > > >> >> > > > } > > >> >> > > > + .rel.dyn : { > > >> >> > > > + *(.rel.*) > > >> >> > > > + } > > >> >> > > > + .rela.dyn : { > > >> >> > > > + *(.rela.*) > > >> >> > > > + } > > >> >> > > > .got : { > > >> >> > > > *(.got) > > >> >> > > > } > > >> >> > > > > >> >> > > Should these be marked (INFO) as well? > > >> >> > > > > >> >> > > > >> >> > Given that sections marked as (INFO) will still be emitted into the > > >> >> > ELF image, it does not really make a difference to do this for zero > > >> >> > sized sections. > > >> >> > > >> >> Oh, I misunderstood -- I though they were _not_ emitted; I see now what > > >> >> you said was not allocated. So, disk space used for the .got.plt case, > > >> >> but not memory space used. Sorry for the confusion! > > >> >> > > >> >> -Kees > > >> > > >> About output section type (INFO): > > >> https://sourceware.org/binutils/docs/ld/Output-Section-Type.html#Output-Section-Type > > >> says "These type names are supported for backward compatibility, and are > > >> rarely used." > > >> > > >> If all input section don't have the SHF_ALLOC flag, the output section > > >> will not have this flag as well. This type is not useful... > > >> > > >> If .got and .got.plt were used, they should be considered dynamic > > >> relocations which should be part of the loadable image. So they should > > >> have the SHF_ALLOC flag. (INFO) will not be applicable anyway. > > >> > > > > > >I don't care deeply either way, but Kees indicated that he would like > > >to get rid of the 24 bytes of .got.plt magic entries that we have no > > >need for. > > > > > >In fact, a lot of this mangling is caused by the fact that the linker > > >is creating a relocatable binary, and assumes that it is a hosted > > >binary that is loaded by a dynamic loader. It would actually be much > > >better if the compiler and linker would take -ffreestanding into > > >account, and suppress GOT entries, PLTs, dynamic program headers for > > >shared libraries altogether. > > > > Linkers (GNU ld and LLD) don't create .got or .got.plt just because the linker > > command line has -pie or -shared. They create .got or .got.plt if there are > > specific needs. > > > > For .got.plt, if there is (1) any .plt/.iplt entry, (2) any .got.plt based > > relocation (e.g. R_X86_64_GOTPC32 on x86-64), or (3) if _GLOBAL_OFFSET_TABLE_ is > > referenced, .got.plt will be created (both GNU ld and LLD) with usually 3 > > entries (for ld.so purposes). > > > > This is not the case for AArch64. There, __GLOBAL_OFFSET_TABLE__ is > always emitted, along with the magic .got.plt entries, regardless of > the input. > > As for the input objects - why is '#pragma GCC visibility(hidden)' not > the default for -ffreestanding builds? This suppresses any GOT entries > emitted by the compiler, but the only way to get this behavior is > through the #pragma, which is how we ended up with '-include hidden.h' > in a couple of places. A -ffreestanding build may provide a shared object used by other applications. For example, musl (libc)'s CFLAGS has -ffreestanding. > IOW, if the toolchain behavior was not 100% geared towards shared > executables as it is today, we would not need the hacks that we need > to apply to get a relocatable bare metal binary like we need for the > KASLR kernel. My mere concern regarding "geared towards shared objects" is that ELF assumes symbols of default visibility are preemptible by default. So unfortunately it is difficult to make -fno-semantic-interposition the default. > If (1) is not satisfied, the created .got.plt is just served as an anchor for > things that want to reference (the distance from GOT base to some point). The > linker will still reserve 3 words but the words are likely not needed. > > I don't think there is a specific need for another option to teach the linker > (GNU ld or LLD) that this is a kernel link. For -ffreestanding builds, cc > -static (ld -no-pie))/-static-pie (-pie) already work quite well. On 2020-06-30, Arvind Sankar wrote: >On Tue, Jun 30, 2020 at 06:26:43PM +0200, Ard Biesheuvel wrote: >> On Tue, 30 Jun 2020 at 01:34, Fangrui Song wrote: >> >> > If (1) is not satisfied, the created .got.plt is just served as an anchor for >> > things that want to reference (the distance from GOT base to some point). The >> > linker will still reserve 3 words but the words are likely not needed. >> > >> > I don't think there is a specific need for another option to teach the linker >> > (GNU ld or LLD) that this is a kernel link. For -ffreestanding builds, cc >> > -static (ld -no-pie))/-static-pie (-pie) already work quite well. >> >> You mean 'ld -static -pie' right? That seems to work. Is that a recent >> invention? > >gcc -static-pie is fairly recent [0], but it just influences how the >linker is invoked AFAIK (at least for gcc) -- in addition to passing >some linker flags, it will change what startup files get linked in (for >non-freestanding). It does not even imply -fPIE to the compiler, which >is confusing as hell. It _would_ be nice if this also told the compiler >that all symbols (perhaps unless explicitly marked) will be resolved at >static link time, so there is no need to use the GOT or PLT for globals. > >As it stands, the executable can still have relocations, GOT and PLT, it >just needs to have startup code to handle them (provided by libc >typically) instead of relying on an external dynamic linker. If the executable is purely static, it does not need to have PLT. All calls to a PLT can be redirected to the function itself. Some range extension thunks (other terms: stub groups, veneers, etc) may still be needed if the distance is too large. There are cases where a GOT cannot be avoided, e.g. extern char foo[] __attribute__((weak, visibility("hidden"))); char *fun() { return foo; } If foo is a SHN_ABS, `movq foo@GOTPCREL(%rip), %rax` can't be optimized by GOTPCRELX (https://sourceware.org/bugzilla/show_bug.cgi?id=25749 binutils>=2.35 will be good) Many other architectures don't even have a GOT optimization. >I don't think it's really relevant for the kernel build -- all we get is >ld -static --no-dynamic-linker, all -static does is prevent searching >shared libraries, and we already pass --no-dynamic-linker if it's >supported. > >[0] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81498