From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754790AbdERHlc (ORCPT ); Thu, 18 May 2017 03:41:32 -0400 Received: from mail-it0-f52.google.com ([209.85.214.52]:36108 "EHLO mail-it0-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752796AbdERHl1 (ORCPT ); Thu, 18 May 2017 03:41:27 -0400 MIME-Version: 1.0 In-Reply-To: References: <20170509193612.64105-1-mka@chromium.org> <25d94b46-765e-f12f-a287-853c76782143@google.com> <20170509214905.GH128305@google.com> <20170510183848.GI128305@google.com> <69A18345-6933-4C6A-8FAC-DBD4D7EF30DE@linaro.org> <20170510194734.GJ128305@google.com> From: Ard Biesheuvel Date: Thu, 18 May 2017 08:41:26 +0100 Message-ID: Subject: Re: [PATCH] efi/libstub: Indicate clang the relocation mode for arm64 To: Greg Hackmann Cc: Matthias Kaehlcke , Matt Fleming , "linux-efi@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Grant Grundler , Michael Davidson , =?UTF-8?Q?Bernhard_Rosenkr=C3=A4nzer?= Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 18 May 2017 at 00:24, Greg Hackmann wrote: > On 05/11/2017 06:51 AM, Ard Biesheuvel wrote: > [snip] >>>>>> >>>>>> In my opinion, the correct fix would be to make -fpie (as opposed to >>>>>> -fpic) imply hidden visibility, given that PIE executables don't >>>>>> export symbols in the first place, and so the preemption rules do not >>>>>> apply. It is worth a try whether -fpie works as expected in this case >>>>>> on Clang, but the last time I tried it on GCC, it behaved exactly like >>>>>> -fpic. >>>>> >>>>> >>>>> Thanks a lot for the detailed description and your suggestions! >>>>> >>>>> A clang build with -fpie for the EFI stub succeeds without complaints >>>>> about GOT entries. I will send out an updated patch (with -fpie only >>>>> for clang) later. >>>>> >>>> >>>> Good! I never liked the visibility hack, which is why I never upstreamed >>>> it. >>>> >>>> Could you please check how recent GCC behaves? >>> >>> >>> I tried GCC v4.9.4 and v6.3.1, both build the EFI stub with -fpie >>> without errors. >>> >>> Are you suggesting to use -fpie for both clang and GCC? Do you know >>> what the minimum required GCC version is for building an arm64 kernel? >> >> >> Yes. Up until now, we have been relying on the position independent >> nature of small model code, but it would be better to specify it >> explicitly, so if -fpie gives us mostly identical code and does not >> need visibility hacks, I would prefer to add it for all compilers and >> not have an exception only for Clang. Note that the same applies to >> the entire kernel when built in KASLR mode, so it would also be good >> to know our options here. >> >> Arnd, Will, what is the oldest GCC version we claim to support for arm64? >> > > Unfortunately, after looking into this a bit more, -fpie by itself doesn't > force clang to disable symbol preeemption. For example when building the > EFI stub from 4.9 with clang, -fpie gives me a stub that crashes with a > synchronous exception inside handle_kernel_image(). The faulting > instruction is a read from __nokaslr that still goes through the GOT. > > Right now you'll get a usable EFI stub with -fpie anyway, since 60f38de7a8d4 > ("efi/libstub: Unify command line param parsing") masked the problem when it > moved __nokaslr behind a helper function. But AIUI there's nothing really > preventing a similar problem in the future. > > You *can* force clang to disable symbol preemption using "-fpie > -mpie-copy-relocations". That said, I don't know enough about EFI to say > whether this is actually appropriate for building the EFI stub. Thanks for digging into this. It is really quite unfortunate that it is so difficult to force Clang (or GCC for that matter) to generate relative references without the compiler assuming that you are building a shared library. Perhaps we need a stronger version of -fvisibility=hidden, i.e., one that applies to extern declarations as well. For the stub, we could simply replace all remaining extern symbol references (if any) with accessor functions, such as the one I added for __nokaslr (which is actually needed for x86 as well, for different reasons). Let me look into this. From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ard Biesheuvel Subject: Re: [PATCH] efi/libstub: Indicate clang the relocation mode for arm64 Date: Thu, 18 May 2017 08:41:26 +0100 Message-ID: References: <20170509193612.64105-1-mka@chromium.org> <25d94b46-765e-f12f-a287-853c76782143@google.com> <20170509214905.GH128305@google.com> <20170510183848.GI128305@google.com> <69A18345-6933-4C6A-8FAC-DBD4D7EF30DE@linaro.org> <20170510194734.GJ128305@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Return-path: In-Reply-To: Sender: linux-efi-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Greg Hackmann Cc: Matthias Kaehlcke , Matt Fleming , "linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , "linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , Grant Grundler , Michael Davidson , =?UTF-8?Q?Bernhard_Rosenkr=C3=A4nzer?= List-Id: linux-efi@vger.kernel.org On 18 May 2017 at 00:24, Greg Hackmann wrote: > On 05/11/2017 06:51 AM, Ard Biesheuvel wrote: > [snip] >>>>>> >>>>>> In my opinion, the correct fix would be to make -fpie (as opposed to >>>>>> -fpic) imply hidden visibility, given that PIE executables don't >>>>>> export symbols in the first place, and so the preemption rules do not >>>>>> apply. It is worth a try whether -fpie works as expected in this case >>>>>> on Clang, but the last time I tried it on GCC, it behaved exactly like >>>>>> -fpic. >>>>> >>>>> >>>>> Thanks a lot for the detailed description and your suggestions! >>>>> >>>>> A clang build with -fpie for the EFI stub succeeds without complaints >>>>> about GOT entries. I will send out an updated patch (with -fpie only >>>>> for clang) later. >>>>> >>>> >>>> Good! I never liked the visibility hack, which is why I never upstreamed >>>> it. >>>> >>>> Could you please check how recent GCC behaves? >>> >>> >>> I tried GCC v4.9.4 and v6.3.1, both build the EFI stub with -fpie >>> without errors. >>> >>> Are you suggesting to use -fpie for both clang and GCC? Do you know >>> what the minimum required GCC version is for building an arm64 kernel? >> >> >> Yes. Up until now, we have been relying on the position independent >> nature of small model code, but it would be better to specify it >> explicitly, so if -fpie gives us mostly identical code and does not >> need visibility hacks, I would prefer to add it for all compilers and >> not have an exception only for Clang. Note that the same applies to >> the entire kernel when built in KASLR mode, so it would also be good >> to know our options here. >> >> Arnd, Will, what is the oldest GCC version we claim to support for arm64? >> > > Unfortunately, after looking into this a bit more, -fpie by itself doesn't > force clang to disable symbol preeemption. For example when building the > EFI stub from 4.9 with clang, -fpie gives me a stub that crashes with a > synchronous exception inside handle_kernel_image(). The faulting > instruction is a read from __nokaslr that still goes through the GOT. > > Right now you'll get a usable EFI stub with -fpie anyway, since 60f38de7a8d4 > ("efi/libstub: Unify command line param parsing") masked the problem when it > moved __nokaslr behind a helper function. But AIUI there's nothing really > preventing a similar problem in the future. > > You *can* force clang to disable symbol preemption using "-fpie > -mpie-copy-relocations". That said, I don't know enough about EFI to say > whether this is actually appropriate for building the EFI stub. Thanks for digging into this. It is really quite unfortunate that it is so difficult to force Clang (or GCC for that matter) to generate relative references without the compiler assuming that you are building a shared library. Perhaps we need a stronger version of -fvisibility=hidden, i.e., one that applies to extern declarations as well. For the stub, we could simply replace all remaining extern symbol references (if any) with accessor functions, such as the one I added for __nokaslr (which is actually needed for x86 as well, for different reasons). Let me look into this.