Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp358052rwd; Wed, 7 Jun 2023 00:31:14 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ71Gc7lplz1ZZxoSmxSyYpqLQm7MdwMmQOpjMcESp0Atxn3tffVnuG9yOVmff32npxDlU9K X-Received: by 2002:a05:6808:1ca:b0:39c:46db:1f83 with SMTP id x10-20020a05680801ca00b0039c46db1f83mr4771639oic.14.1686123074169; Wed, 07 Jun 2023 00:31:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686123074; cv=none; d=google.com; s=arc-20160816; b=zSYke65NCVjFrFILw1K3PMBAt/EJ6Pam+N88iKFS4DAWhQPPIx9PbItK0VnUGNhRWd i3vwg3zB85JJUOVlYuDesla0Ct5mbzN1kktyXgGKkOFL0HkEORy/RW4hFH1/kOqhzdAA JsAG7tnb+4KjtOFxXakvbklokK8sSt/sIpGUJiC+GVww/4J5fqvvdMHKKl5vfamKPvII EA077uYramYrqEj4fKbFpfH1kOcUVrytyup84XgvXLRxEpL9s1xZ0dCP3xI8TSR9OdAu daeYSdzHYOJgcAxam5GCjdoOU22QvrHb+dWwzm4Ti4Y1Bom/PQHMbc7jfVBABetBU6na jCng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=u2/SCo5m3z1e4xTg6tfOnhUyURbP1ZtoeaFw+Zn+qTw=; b=QbioA+7mjfupYyLBK083DVuSjT/4P/u8KrQxetKWF5RoNnP/syty7T5jlWgn/vC5WK LGUoD0QX25ao+1NIfVd7BdHZ8VuI0d901se/8HXW6VQ0kE7Zsxl8m1UEi+hm5578OgxR hucZU6Y7PjcohKOssUmfT0Z4OHTNZ5qagyTW/gOHeUYDRoxnmHQTyrElB+M1NAeAhD2V ajWTtKrI9E8KPGkpknVKGWlqixKIWa/XcDdL28ILF2ltQw2/IZ3LA9+3oOMvDuyOw5Xs bh/+0z6buZ+mVzyMhjkeZIzBmrCO/MeE03V08GWlTwoZh7nk/rlEqZ1sGU4CCSdrb9mF kQoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HbIRsV7a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e2-20020a170902b78200b001ae7c646551si8373263pls.392.2023.06.07.00.31.01; Wed, 07 Jun 2023 00:31:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HbIRsV7a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239037AbjFGH2W (ORCPT + 99 others); Wed, 7 Jun 2023 03:28:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53796 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239033AbjFGH0r (ORCPT ); Wed, 7 Jun 2023 03:26:47 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ED5092D72; Wed, 7 Jun 2023 00:25:11 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id C68F761158; Wed, 7 Jun 2023 07:25:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6A596C4339E; Wed, 7 Jun 2023 07:25:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1686122704; bh=DgIwHiqbmr593p9YlPsAqYmPhsSZnjp5/M5rhaPu7Lk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HbIRsV7ajtzb9V60YJCrMao2S2XndXaJgossj0OsUpBPBNvJoErUVKwGh20aRLgYc Su8hyyK+zKzuO+OemgRTc2naA64H/zDUxk/UoPeXOS/4Ncki/4x7AYPY16K0SWmkP9 muku/oWOA066kBNACTi3lTiw6DP7j4mI4SigYu2NzLUbYxm7jzH1uW/j71dygNxDCw vsIZ+M4gFxjI1Uj/AaPDBwpuHbc6V4bzUZgRsiC/JyuwzlQmz8T/T3hc69HkCCngW5 cFO5wR+TEmFDIjq090eHJxgL1jwpNPFSziEztnlRmXa/ySFU57nMlfwV0JFZp4qQtJ YoH+hpZ/cD+lw== From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Ard Biesheuvel , Evgeniy Baskov , Borislav Petkov , Andy Lutomirski , Dave Hansen , Ingo Molnar , Peter Zijlstra , Thomas Gleixner , Alexey Khoroshilov , Peter Jones , Gerd Hoffmann , Dave Young , Mario Limonciello , Kees Cook , Tom Lendacky , "Kirill A . Shutemov" , Linus Torvalds , Joerg Roedel Subject: [PATCH v5 16/20] x86/decompressor: Move global symbol references to C code Date: Wed, 7 Jun 2023 09:23:38 +0200 Message-Id: <20230607072342.4054036-17-ardb@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230607072342.4054036-1-ardb@kernel.org> References: <20230607072342.4054036-1-ardb@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=5078; i=ardb@kernel.org; h=from:subject; bh=DgIwHiqbmr593p9YlPsAqYmPhsSZnjp5/M5rhaPu7Lk=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIaXBoCI4JFJK5cSdbQzaEa9WvHAvalOcb2s9b8Vmhcc8r BqL4po7SlkYxDgYZMUUWQRm/3238/REqVrnWbIwc1iZQIYwcHEKwEQsMhn+qZo4R87bcM/hT/HF njsHDvvb/V52aUm4lUq08LLKgyUfNBj+5xkZSV9r7TTybZKvlmIVn6zpEHF1vnTv7LSttU0ai2U 4AQ== X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It is no longer necessary to be cautious when referring to global variables in the position independent decompressor code, now that it is built using PIE codegen and makes an assertion in the linker script that no GOT entries exist (which would require adjustment for the actual runtime load address of the decompressor binary). This means global variables can be referenced directly from C code, instead of having to pass their runtime addresses into C routines from asm code, which needs to happen at each call site. Do so for the code that will be called directly from the EFI stub after a subsequent patch, and avoid the need to duplicate this logic a third time. Signed-off-by: Ard Biesheuvel --- arch/x86/boot/compressed/head_32.S | 8 -------- arch/x86/boot/compressed/head_64.S | 8 +------- arch/x86/boot/compressed/misc.c | 16 +++++++++------- 3 files changed, 10 insertions(+), 22 deletions(-) diff --git a/arch/x86/boot/compressed/head_32.S b/arch/x86/boot/compressed/head_32.S index 3530465b5b85ccf3..beee858058df4403 100644 --- a/arch/x86/boot/compressed/head_32.S +++ b/arch/x86/boot/compressed/head_32.S @@ -168,13 +168,7 @@ SYM_FUNC_START_LOCAL_NOALIGN(.Lrelocated) */ /* push arguments for extract_kernel: */ - pushl output_len@GOTOFF(%ebx) /* decompressed length, end of relocs */ pushl %ebp /* output address */ - pushl input_len@GOTOFF(%ebx) /* input_len */ - leal input_data@GOTOFF(%ebx), %eax - pushl %eax /* input_data */ - leal boot_heap@GOTOFF(%ebx), %eax - pushl %eax /* heap area */ pushl %esi /* real mode pointer */ call extract_kernel /* returns kernel entry point in %eax */ addl $24, %esp @@ -202,8 +196,6 @@ SYM_DATA_END_LABEL(gdt, SYM_L_LOCAL, gdt_end) */ .bss .balign 4 -boot_heap: - .fill BOOT_HEAP_SIZE, 1, 0 boot_stack: .fill BOOT_STACK_SIZE, 1, 0 boot_stack_end: diff --git a/arch/x86/boot/compressed/head_64.S b/arch/x86/boot/compressed/head_64.S index 408c7824b647ff51..556ee504325ae50e 100644 --- a/arch/x86/boot/compressed/head_64.S +++ b/arch/x86/boot/compressed/head_64.S @@ -493,11 +493,7 @@ SYM_FUNC_START_LOCAL_NOALIGN(.Lrelocated) * Do the extraction, and jump to the new kernel.. */ movq %r15, %rdi /* pass struct boot_params pointer */ - leaq boot_heap(%rip), %rsi /* malloc area for uncompression */ - leaq input_data(%rip), %rdx /* input_data */ - movl input_len(%rip), %ecx /* input_len */ - movq %rbp, %r8 /* output target address */ - movl output_len(%rip), %r9d /* decompressed length, end of relocs */ + movq %rbp, %rsi /* output target address */ call extract_kernel /* returns kernel entry point in %rax */ /* @@ -639,8 +635,6 @@ SYM_DATA_END_LABEL(boot_idt, SYM_L_GLOBAL, boot_idt_end) */ .bss .balign 4 -SYM_DATA_LOCAL(boot_heap, .fill BOOT_HEAP_SIZE, 1, 0) - SYM_DATA_START_LOCAL(boot_stack) .fill BOOT_STACK_SIZE, 1, 0 .balign 16 diff --git a/arch/x86/boot/compressed/misc.c b/arch/x86/boot/compressed/misc.c index 94b7abcf624b3b55..0b29a3183df42246 100644 --- a/arch/x86/boot/compressed/misc.c +++ b/arch/x86/boot/compressed/misc.c @@ -330,6 +330,11 @@ static size_t parse_elf(void *output) return ehdr.e_entry - LOAD_PHYSICAL_ADDR; } +static u8 boot_heap[BOOT_HEAP_SIZE] __aligned(4); + +extern unsigned char input_data[]; +extern unsigned int input_len, output_len; + /* * The compressed kernel image (ZO), has been moved so that its position * is against the end of the buffer used to hold the uncompressed kernel @@ -347,14 +352,11 @@ static size_t parse_elf(void *output) * |-------uncompressed kernel image---------| * */ -asmlinkage __visible void *extract_kernel(void *rmode, memptr heap, - unsigned char *input_data, - unsigned long input_len, - unsigned char *output, - unsigned long output_len) +asmlinkage __visible void *extract_kernel(void *rmode, unsigned char *output) { const unsigned long kernel_total_size = VO__end - VO__text; unsigned long virt_addr = LOAD_PHYSICAL_ADDR; + memptr heap = (memptr)boot_heap; unsigned long needed_size; size_t entry_offset; @@ -412,7 +414,7 @@ asmlinkage __visible void *extract_kernel(void *rmode, memptr heap, * entries. This ensures the full mapped area is usable RAM * and doesn't include any reserved areas. */ - needed_size = max(output_len, kernel_total_size); + needed_size = max((unsigned long)output_len, kernel_total_size); #ifdef CONFIG_X86_64 needed_size = ALIGN(needed_size, MIN_KERNEL_ALIGN); #endif @@ -443,7 +445,7 @@ asmlinkage __visible void *extract_kernel(void *rmode, memptr heap, #ifdef CONFIG_X86_64 if (heap > 0x3fffffffffffUL) error("Destination address too large"); - if (virt_addr + max(output_len, kernel_total_size) > KERNEL_IMAGE_SIZE) + if (virt_addr + needed_size > KERNEL_IMAGE_SIZE) error("Destination virtual address is beyond the kernel mapping area"); #else if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff)) -- 2.39.2