Received: by 2002:ab2:69cc:0:b0:1f4:be93:e15a with SMTP id n12csp1551084lqp; Mon, 15 Apr 2024 09:31:53 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWUHnN+247ZBupBXweuAoTJgRnKbR9a5Bwalx3dIls+9SuQ5Y4sgUez1NJH87TnE4KtHe7eCqWZGSaHCUFE+8Oapz5ne0lcY9SA+yvChw== X-Google-Smtp-Source: AGHT+IHHfeuEnlPzj16NkfSyaWSbcHow3EtvSI/dp637Kp6yCSV8Qp89XnG8tl9f6eVcb8d7qXY9 X-Received: by 2002:a17:90a:62c8:b0:2a6:46af:8882 with SMTP id k8-20020a17090a62c800b002a646af8882mr7554827pjs.7.1713198712547; Mon, 15 Apr 2024 09:31:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713198712; cv=pass; d=google.com; s=arc-20160816; b=SVFLgH/cAa8OXtcfM/gKwdF2W3MQUcKLn7iI3f9SvrbguCzbkjJBquy1m+AgaQ+CVO Jq3gwGWdP3MvSOl6awO3odYq0eTnpVVdQriMc+nUlcn0DpaRRIDRAGoNAQkylVDMofE2 V706ES93UZIvQbe2YNlIo7uaIUpHzIuoL8TzwsaV/j0prJ4omCVwK9WquQQqkO1ugIOm AJFcjQFcP2Ptn6UED5NL0G5N7X+AFLB2whXCvAsJkgjeCEqLElAvzs7MieVLknoIp8ZD dC8kypDUpFQXa8plUE3+VEo2s/pS5o+Ov5GQ/uNX8rj5XPGj2QM1wzfhGuMwFCIHWeMf zNAA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=olXUbwFvWhAHV+rAKgvFMgGXe2ohRAJCIFGXNNajNx8=; fh=k48LqT9ncz8rXJGJz03d+2taK7nQO6X20Kt0WoREIa0=; b=kewj3K/fmx8PfyaCgfEzOKhyX1U5pwPGWCdJ5HkN69BcWxZrnEMkRLbPKTk+ASbdXw +bKGoNMcQ/4f55AWG3uJD5Rpv7t7Xx14dOZ3nlCq2yYPTQD2Czt277oyoAGu9UQP6lsO W/h7f4xefguFdrPHM9YLPHqC/2ZjlP0IqAuG5CHbHFm1oXUPWkuSeRWLVMu1nnlG7Ap/ bMtAjlAffKDccI07PoE8z3QtdwThgzzwQoSjqes1H/TATFQyiOKo+SMtUcbXqR+w+Skt DPlA9RXhBRzQDP9DP8zMh21vP0w44hTaP2Z1U+Bl1jGNPJPuvVeveBxL4oqcjg7POPSa 46HA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=tW3VgdYQ; arc=pass (i=1 spf=pass spfdomain=flex--ardb.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-145541-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-145541-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id x10-20020a17090a1f8a00b002a2140cc869si10350271pja.130.2024.04.15.09.31.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Apr 2024 09:31:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-145541-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=tW3VgdYQ; arc=pass (i=1 spf=pass spfdomain=flex--ardb.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-145541-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-145541-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id B3DDFB23011 for ; Mon, 15 Apr 2024 16:21:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 054E180C14; Mon, 15 Apr 2024 16:20:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="tW3VgdYQ" Received: from mail-wr1-f73.google.com (mail-wr1-f73.google.com [209.85.221.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 52F3881ABB for ; Mon, 15 Apr 2024 16:20:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.73 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713198054; cv=none; b=ZZaOh/zCrCiycdy05ouw8XijcA9W2V+GrZgv51zKteJGAM+i8RaBMbEGvr/iI1w3tQmxFL7xhyM4ACjVA2YHk8rwP/i3YSaXzClarHYz4sh/mG9O8s/Y4Jbq7hd47QwcY8bSoY8M8PsmYp6DZoG84BU/WC+J2rX+NiZS++387Pc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713198054; c=relaxed/simple; bh=J2hRLplVLxqxMA6E8xzPuTVt84azbEdp5qYIhiP3Ytk=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=Aqud+y1g98AefQCQ9uCLaYRgYFTBodVl6gWIEcG5C6355F1Cmfof7ULd0DE8j7amOX3xEMbMIeK9iXHxbtO+huADTKWolY3bNwmLGmDK2y8tqUafebmA9YjZN48NqxfMb/zw3gS8LfBkF/ci7JUYRkNFDIqvxYX3HZyTZCMOuMA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=tW3VgdYQ; arc=none smtp.client-ip=209.85.221.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Received: by mail-wr1-f73.google.com with SMTP id ffacd0b85a97d-343ee356227so2145833f8f.2 for ; Mon, 15 Apr 2024 09:20:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1713198051; x=1713802851; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=olXUbwFvWhAHV+rAKgvFMgGXe2ohRAJCIFGXNNajNx8=; b=tW3VgdYQhj9Ps0Xz/R6HP5MGxymyZo/hkAZxHGEaeUBmSrdKjh3S1fhC9FDCnOD27I s+KFdVKLmC1hUhkxtQ/4xHexYKMIYNVmTpp5CwWt1zcmyTzNjR+1Z3V0A1tRvYGtr4Bl mAcKj5iw5Y/Jtw/czykKcXRYmEsE32Q1QyFWcSRZunnyeU3dA2DBusaasQy4oVRtwcK/ R7mZFoBmiBVbWoCum93b0U8eL9EDjs4DaJBBzwyscc4IcMV5/Ox2ub3JDv9NV/S9Hd1T e9HsVqLNk07HBUQPeHp2nsBVW2og1hD/7uQoiY5iLtUyOVhI4AjWLh4tsLWvpA5749aS x1vQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713198051; x=1713802851; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=olXUbwFvWhAHV+rAKgvFMgGXe2ohRAJCIFGXNNajNx8=; b=AfX4Z5qzp6YRXnpglpedBZEj5J1cjzdjG3ZWoJ7IbmUuzPiLvDwv0G97PTrYpWnjK+ 4S8bwB5S8tn/ixDw8LOAjflrcuLESLk0jUwBXJ6excRzUxunXZi0evfAxDbnGHHpYNSb CaQgJLOpK4CPSCgEok9f2uZZ+6+3eoQxt6iYEhjyWTIq8XpEuUj935Xwa9Rw3EUkRdLb 3odNP+R+SIzSSuKjLS2ZhCzGYpfTT4CpZId/X5pH8qBhWBR6D3FoqtSJMw7A/h8a0fqH pg4rQhEpctV5bGQG4Bac15FLBgYNP2XPSEb56qsgOAwyHpYixDKCO0vdM1Ad5iNa1bH1 npDw== X-Gm-Message-State: AOJu0Yx854JA+kUvoDoyykK6kCymAOgx7fXeJ2uMvNMnD4t85gm+67aO jRvIoJOTeKFo1P3bNzP4U5swYptkJpeMUdQcma3xwKy+iyos0GN2tJKi9DsodI0Dbudz3NAfIt6 M3ODgjTNGLdo4qqFp8ECI6DOmyZ5uBEc3wrd4jd2TLyfgO97oOE13C3KDrIb0kfWUXK1zw8ijri D2sioMShTCyPeu9OUNg9LyIK7L2reLwQ== X-Received: from palermo.c.googlers.com ([fda3:e722:ac3:cc00:28:9cb1:c0a8:118a]) (user=ardb job=sendgmr) by 2002:adf:e38a:0:b0:346:35ad:3d0f with SMTP id e10-20020adfe38a000000b0034635ad3d0fmr20173wrm.4.1713198050558; Mon, 15 Apr 2024 09:20:50 -0700 (PDT) Date: Mon, 15 Apr 2024 18:20:43 +0200 In-Reply-To: <20240415162041.2491523-5-ardb+git@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240415162041.2491523-5-ardb+git@google.com> X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=5390; i=ardb@kernel.org; h=from:subject; bh=V4aOk/fz1+fDF2STMCLU+VVQ7hXwmmgXF9wA63lernQ=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIU02+HbVugcM9mKl8d6vVHKWyArYhkd23LGffr56kkK50 KrJ01Z0lLIwiHEwyIopsgjM/vtu5+mJUrXOs2Rh5rAygQxh4OIUgInU2DAy9PNsWrBtzrbqf115 on+fPH3+LXWlpem1sgfxW09/+ntpqT0jw+wZE16KfngW3NcZJpls23ek6l5NQKri/IiImAsLNI8 oMgAA X-Mailer: git-send-email 2.44.0.683.g7961c838ac-goog Message-ID: <20240415162041.2491523-6-ardb+git@google.com> Subject: [PATCH v4 1/3] kallsyms: Avoid weak references for kallsyms symbols From: Ard Biesheuvel To: linux-kernel@vger.kernel.org Cc: Ard Biesheuvel , Masahiro Yamada , Arnd Bergmann , Martin KaFai Lau , linux-arch@vger.kernel.org, linux-kbuild@vger.kernel.org, bpf@vger.kernel.org, Andrii Nakryiko , Jiri Olsa , Nick Desaulniers , Kees Cook Content-Type: text/plain; charset="UTF-8" From: Ard Biesheuvel kallsyms is a directory of all the symbols in the vmlinux binary, and so creating it is somewhat of a chicken-and-egg problem, as its non-zero size affects the layout of the binary, and therefore the values of the symbols. For this reason, the kernel is linked more than once, and the first pass does not include any kallsyms data at all. For the linker to accept this, the symbol declarations describing the kallsyms metadata are emitted as having weak linkage, so they can remain unsatisfied. During the subsequent passes, the weak references are satisfied by the kallsyms metadata that was constructed based on information gathered from the preceding passes. Weak references lead to somewhat worse codegen, because taking their address may need to produce NULL (if the reference was unsatisfied), and this is not usually supported by RIP or PC relative symbol references. Given that these references are ultimately always satisfied in the final link, let's drop the weak annotation, and instead, provide fallback definitions in the linker script that are only emitted if an unsatisfied reference exists. While at it, drop the FRV specific annotation that these symbols reside in .rodata - FRV is long gone. Tested-by: Nick Desaulniers # Boot Reviewed-by: Nick Desaulniers Reviewed-by: Kees Cook Acked-by: Arnd Bergmann Link: https://lkml.kernel.org/r/20230504174320.3930345-1-ardb%40kernel.org Signed-off-by: Ard Biesheuvel --- include/asm-generic/vmlinux.lds.h | 19 +++++++++++++ kernel/kallsyms.c | 6 ---- kernel/kallsyms_internal.h | 30 ++++++++------------ 3 files changed, 31 insertions(+), 24 deletions(-) diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h index f7749d0f2562..e8449be62058 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -448,11 +448,30 @@ #endif #endif +/* + * Some symbol definitions will not exist yet during the first pass of the + * link, but are guaranteed to exist in the final link. Provide preliminary + * definitions that will be superseded in the final link to avoid having to + * rely on weak external linkage, which requires a GOT when used in position + * independent code. + */ +#define PRELIMINARY_SYMBOL_DEFINITIONS \ + PROVIDE(kallsyms_addresses = .); \ + PROVIDE(kallsyms_offsets = .); \ + PROVIDE(kallsyms_names = .); \ + PROVIDE(kallsyms_num_syms = .); \ + PROVIDE(kallsyms_relative_base = .); \ + PROVIDE(kallsyms_token_table = .); \ + PROVIDE(kallsyms_token_index = .); \ + PROVIDE(kallsyms_markers = .); \ + PROVIDE(kallsyms_seqs_of_names = .); + /* * Read only Data */ #define RO_DATA(align) \ . = ALIGN((align)); \ + PRELIMINARY_SYMBOL_DEFINITIONS \ .rodata : AT(ADDR(.rodata) - LOAD_OFFSET) { \ __start_rodata = .; \ *(.rodata) *(.rodata.*) \ diff --git a/kernel/kallsyms.c b/kernel/kallsyms.c index 18edd57b5fe8..22ea19a36e6e 100644 --- a/kernel/kallsyms.c +++ b/kernel/kallsyms.c @@ -325,12 +325,6 @@ static unsigned long get_symbol_pos(unsigned long addr, unsigned long symbol_start = 0, symbol_end = 0; unsigned long i, low, high, mid; - /* This kernel should never had been booted. */ - if (!IS_ENABLED(CONFIG_KALLSYMS_BASE_RELATIVE)) - BUG_ON(!kallsyms_addresses); - else - BUG_ON(!kallsyms_offsets); - /* Do a binary search on the sorted kallsyms_addresses array. */ low = 0; high = kallsyms_num_syms; diff --git a/kernel/kallsyms_internal.h b/kernel/kallsyms_internal.h index 27fabdcc40f5..85480274fc8f 100644 --- a/kernel/kallsyms_internal.h +++ b/kernel/kallsyms_internal.h @@ -5,27 +5,21 @@ #include /* - * These will be re-linked against their real values - * during the second link stage. + * These will be re-linked against their real values during the second link + * stage. Preliminary values must be provided in the linker script using the + * PROVIDE() directive so that the first link stage can complete successfully. */ -extern const unsigned long kallsyms_addresses[] __weak; -extern const int kallsyms_offsets[] __weak; -extern const u8 kallsyms_names[] __weak; +extern const unsigned long kallsyms_addresses[]; +extern const int kallsyms_offsets[]; +extern const u8 kallsyms_names[]; -/* - * Tell the compiler that the count isn't in the small data section if the arch - * has one (eg: FRV). - */ -extern const unsigned int kallsyms_num_syms -__section(".rodata") __attribute__((weak)); - -extern const unsigned long kallsyms_relative_base -__section(".rodata") __attribute__((weak)); +extern const unsigned int kallsyms_num_syms; +extern const unsigned long kallsyms_relative_base; -extern const char kallsyms_token_table[] __weak; -extern const u16 kallsyms_token_index[] __weak; +extern const char kallsyms_token_table[]; +extern const u16 kallsyms_token_index[]; -extern const unsigned int kallsyms_markers[] __weak; -extern const u8 kallsyms_seqs_of_names[] __weak; +extern const unsigned int kallsyms_markers[]; +extern const u8 kallsyms_seqs_of_names[]; #endif // LINUX_KALLSYMS_INTERNAL_H_ -- 2.44.0.683.g7961c838ac-goog