Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1621727ybh; Tue, 14 Jul 2020 02:50:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHf2v3Symka/npPDFYOovv1KkQIkzNVl3pC24E01127BfS7XKM6G/k4NHmLjDUP3CAhR5d X-Received: by 2002:aa7:d4d2:: with SMTP id t18mr3588243edr.166.1594720243014; Tue, 14 Jul 2020 02:50:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594720243; cv=none; d=google.com; s=arc-20160816; b=YDqUaZ1ZpSHDBMHiNsqP/FTqf3mGvTYDN+WbQwaU9px4Jhapttd/ePudACk8Sa6JIe 2EW/u9pl1S5CAanqAvXArCRMigitSqVaK6up3u7Vx4qpYZwlXNtYjZaPYl5fo5RFNCc1 IcpfyRqvF5LPNgGKtvGYjV4Tvf1L/iHvuOI0P8ZdiNAlGlqxcGqdlUd4oaco2aFi2WfA z8eVXc+LkfnI4BlnhHJietQJDyZSvSnn+d2nEnJKqDOU5DSmkljHKFIEHvLWZ/l4vdOm ollo6w3cfyumbdr9SFEszZH0ZvhEPSoZ7lHtd/PMMf/B5GG62e4htdz9+Btbs4nkms0q BpHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=YqNccpuxOJFkoTpfanGInwjU6OHFaJ82qtoZ/UbUys4=; b=TPIa5F5RCi4NyaIem9k5y7u1A4VNHjiCYN6DieX7ahMlP0fmD0JkJJChBS109nznlR 2L91heor1zp3erYGNCOVFgUzMcRYxDE3LR30YASqZWO+hiGSvCqOxqbpm128zoSK9iqQ C7hhWzsGSlU91xj+Cf2Sidug83SaX3PT6KoZiO57IIctnbfQRfmM3MmKyZtsb9KGjh8f sylHxTIhgxhtJjOAAwb06iFtA31vRGmZAkZ/KIET6m00ftysT5mnb6oIvHVhL6OiWwy+ Y2nN8UiG47MR4sxHrnNBWi5/UiKulFN5mXbTIMKrF+sOlN7HdYNWYGCLKoZ2no3PGp6O fcxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TKihbRN9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c11si11369582edy.498.2020.07.14.02.50.15; Tue, 14 Jul 2020 02:50:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TKihbRN9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726734AbgGNJrv (ORCPT + 99 others); Tue, 14 Jul 2020 05:47:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:37602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725955AbgGNJru (ORCPT ); Tue, 14 Jul 2020 05:47:50 -0400 Received: from mail-ot1-f53.google.com (mail-ot1-f53.google.com [209.85.210.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 87C63221EE for ; Tue, 14 Jul 2020 09:47:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594720069; bh=Q8/MTPkiNQDIl29cAWYRiBnVKbFpRJbp1QXArV8qECA=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=TKihbRN9GyDAJYU7aabSNNmw+cwcRU6uA+fCvMM0MqgkEUL4LbJ6gS+yBolI63V54 9hKRykdpE+y3S1bjCu7RHz6JTIXiBpTXppCuT/ETpK4CCukdkkM0f+cUIhRHZ8kq2O JJ66LANx3inJNONXh7Vv/cTSDIx3M8VPpNIu2mzo= Received: by mail-ot1-f53.google.com with SMTP id e90so12603957ote.1 for ; Tue, 14 Jul 2020 02:47:49 -0700 (PDT) X-Gm-Message-State: AOAM533/9Hyf6Sobe09M1sxAPO4swakE6oz3Jj+JrHAeVZmo7vY9XzK8 9A1JoSWpN0VStL3EgV+yALfq8HSIl0i52bSYWQU= X-Received: by 2002:a9d:688:: with SMTP id 8mr3330059otx.108.1594720068773; Tue, 14 Jul 2020 02:47:48 -0700 (PDT) MIME-Version: 1.0 References: <20200629140928.858507-1-nivedita@alum.mit.edu> <20200629140928.858507-3-nivedita@alum.mit.edu> In-Reply-To: From: Ard Biesheuvel Date: Tue, 14 Jul 2020 12:47:37 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 2/7] x86/boot/compressed: Force hidden visibility for all symbol references To: Sedat Dilek Cc: Arvind Sankar , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , X86 ML , Nick Desaulniers , Fangrui Song , Dmitry Golovin , Clang-Built-Linux ML , Masahiro Yamada , Daniel Kiper , Kees Cook , Nathan Chancellor , Arnd Bergmann , "H . J . Lu" , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 14 Jul 2020 at 12:21, Sedat Dilek wrote: > > On Mon, Jun 29, 2020 at 4:09 PM Arvind Sankar wrote: > > > > From: Ard Biesheuvel > > > > Eliminate all GOT entries in the decompressor binary, by forcing hidden > > visibility for all symbol references, which informs the compiler that > > such references will be resolved at link time without the need for > > allocating GOT entries. > > > > To ensure that no GOT entries will creep back in, add an assertion to > > the decompressor linker script that will fire if the .got section has > > a non-zero size. > > > > [Arvind: fixup -include hidden.h to -include $(srctree)/$(src)/hidden.h] > > > > Thanks for your v3 patchset. > > I tried your initial patchset and informed you about the > include file handling. > Dropped your patchset against Linux v5.7 as I got no (satisfying) replies. Dropped from where? This series should be taken through the -tip tree. > For me this one is missing a Reported-by of mine. > We don't usually add reported-by lines for issues that were resolved before the series was merged, given that the reported issue never existed in mainline to begin with. > As I want to test the whole v3 series, I will report later. > A tested-by is always appreciated. > - Sedat - > > > Signed-off-by: Ard Biesheuvel > > Acked-by: Arvind Sankar > > Signed-off-by: Arvind Sankar > > From: Ard Biesheuvel > > Link: https://lore.kernel.org/r/20200523120021.34996-3-ardb@kernel.org > > --- > > arch/x86/boot/compressed/Makefile | 1 + > > arch/x86/boot/compressed/hidden.h | 19 +++++++++++++++++++ > > arch/x86/boot/compressed/vmlinux.lds.S | 1 + > > 3 files changed, 21 insertions(+) > > create mode 100644 arch/x86/boot/compressed/hidden.h > > > > diff --git a/arch/x86/boot/compressed/Makefile b/arch/x86/boot/compressed/Makefile > > index 7619742f91c9..b01c8aed0f23 100644 > > --- a/arch/x86/boot/compressed/Makefile > > +++ b/arch/x86/boot/compressed/Makefile > > @@ -42,6 +42,7 @@ KBUILD_CFLAGS += $(call cc-disable-warning, gnu) > > KBUILD_CFLAGS += -Wno-pointer-sign > > KBUILD_CFLAGS += $(call cc-option,-fmacro-prefix-map=$(srctree)/=) > > KBUILD_CFLAGS += -fno-asynchronous-unwind-tables > > +KBUILD_CFLAGS += -include $(srctree)/$(src)/hidden.h > > > > KBUILD_AFLAGS := $(KBUILD_CFLAGS) -D__ASSEMBLY__ > > GCOV_PROFILE := n > > diff --git a/arch/x86/boot/compressed/hidden.h b/arch/x86/boot/compressed/hidden.h > > new file mode 100644 > > index 000000000000..49a17b6b5962 > > --- /dev/null > > +++ b/arch/x86/boot/compressed/hidden.h > > @@ -0,0 +1,19 @@ > > +/* SPDX-License-Identifier: GPL-2.0 */ > > +/* > > + * When building position independent code with GCC using the -fPIC option, > > + * (or even the -fPIE one on older versions), it will assume that we are > > + * building a dynamic object (either a shared library or an executable) that > > + * may have symbol references that can only be resolved at load time. For a > > + * variety of reasons (ELF symbol preemption, the CoW footprint of the section > > + * that is modified by the loader), this results in all references to symbols > > + * with external linkage to go via entries in the Global Offset Table (GOT), > > + * which carries absolute addresses which need to be fixed up when the > > + * executable image is loaded at an offset which is different from its link > > + * time offset. > > + * > > + * Fortunately, there is a way to inform the compiler that such symbol > > + * references will be satisfied at link time rather than at load time, by > > + * giving them 'hidden' visibility. > > + */ > > + > > +#pragma GCC visibility push(hidden) > > diff --git a/arch/x86/boot/compressed/vmlinux.lds.S b/arch/x86/boot/compressed/vmlinux.lds.S > > index b17d218ccdf9..4bcc943842ab 100644 > > --- a/arch/x86/boot/compressed/vmlinux.lds.S > > +++ b/arch/x86/boot/compressed/vmlinux.lds.S > > @@ -81,6 +81,7 @@ SECTIONS > > DISCARDS > > } > > > > +ASSERT(SIZEOF(.got) == 0, "Unexpected GOT entries detected!") > > #ifdef CONFIG_X86_64 > > ASSERT(SIZEOF(.got.plt) == 0 || SIZEOF(.got.plt) == 0x18, "Unexpected GOT/PLT entries detected!") > > #else > > -- > > 2.26.2 > >