Re: [RFC PATCH] kallsyms: Avoid weak references for kallsyms symbols

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, May 4, 2023 at 10:43 AM Ard Biesheuvel <ardb@xxxxxxxxxx> wrote:
>
> kallsyms is a directory of all the symbols in the vmlinux binary, and so
> creating it is somewhat of a chicken-and-egg problem, as its non-zero
> size affects the layout of the binary, and therefore the values of the
> symbols.
>
> For this reason, the kernel is linked more than once, and the first pass
> does not include any kallsyms data at all. For the linker to accept
> this, the symbol declarations describing the kallsyms metadata are
> emitted as having weak linkage, so they can remain unsatisfied. During
> the subsequent passes, the weak references are satisfied by the kallsyms
> metadata that was constructed based on information gathered from the
> preceding passes.
>
> Weak references lead to somewhat worse codegen, because taking their
> address may need to produce NULL (if the reference was unsatisfied), and
> this is not usually supported by RIP or PC relative symbol references.
>
> Given that these references are ultimately always satisfied in the final
> link, let's drop the weak annotation, and instead, provide fallback
> definitions in the linker script that are only emitted if an unsatisfied
> reference exists.
>
> While at it, drop the FRV specific annotation that these symbols reside
> in .rodata - FRV is long gone.
>
> Cc: Arnd Bergmann <arnd@xxxxxxxx>
> Cc: Fangrui Song <maskray@xxxxxxxxxx>
> Cc: Nathan Chancellor <nathan@xxxxxxxxxx>
> Cc: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>

Thanks for the patch.  I did some quick boot tests of this with:
- x86 defconfig + CONFIG_KALLSYMS_SELFTEST=y
- x86 defconfig + CONFIG_KALLSYMS_SELFTEST=y + CONFIG_LTO_CLANG_THIN=y
- arm64 defconfig + CONFIG_KALLSYMS_SELFTEST=y

Curiously, I only see:
[    1.002200] kallsyms_selftest: start

in the output (when grepping for kallsyms_selftest as instructed by
the help text for KALLSYMS_SELFTEST in init/Kconfig). But that happens
regardless of this patch.

I did not test backtraces or live patching (seems like kallsyms is
related to those reading through the help texts in init/Kconfig), or
measure for binary changes.

Tested-by: Nick Desaulniers <ndesaulniers@xxxxxxxxxx> # Boot

Based on my interpretation of
https://sourceware.org/binutils/docs/ld/PROVIDE.html, this LGTM.

Reviewed-by: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>

> Cc: Kees Cook <keescook@xxxxxxxxxxxx>
> Signed-off-by: Ard Biesheuvel <ardb@xxxxxxxxxx>
> ---
>  include/asm-generic/vmlinux.lds.h |  9 +++++++
>  kernel/kallsyms.c                 |  6 -----
>  kernel/kallsyms_internal.h        | 25 +++++++-------------
>  3 files changed, 18 insertions(+), 22 deletions(-)
>
> diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h
> index d1f57e4868ed341d..dd42c0fcad2b519f 100644
> --- a/include/asm-generic/vmlinux.lds.h
> +++ b/include/asm-generic/vmlinux.lds.h
> @@ -460,6 +460,15 @@
>   */
>  #define RO_DATA(align)                                                 \
>         . = ALIGN((align));                                             \
> +       PROVIDE(kallsyms_addresses = .);                                \
> +       PROVIDE(kallsyms_offsets = .);                                  \
> +       PROVIDE(kallsyms_names = .);                                    \
> +       PROVIDE(kallsyms_num_syms = .);                                 \
> +       PROVIDE(kallsyms_relative_base = .);                            \
> +       PROVIDE(kallsyms_token_table = .);                              \
> +       PROVIDE(kallsyms_token_index = .);                              \
> +       PROVIDE(kallsyms_markers = .);                                  \
> +       PROVIDE(kallsyms_seqs_of_names = .);                            \
>         .rodata           : AT(ADDR(.rodata) - LOAD_OFFSET) {           \
>                 __start_rodata = .;                                     \
>                 *(.rodata) *(.rodata.*)                                 \
> diff --git a/kernel/kallsyms.c b/kernel/kallsyms.c
> index 77747391f49b66cb..5b16009ee53aa05b 100644
> --- a/kernel/kallsyms.c
> +++ b/kernel/kallsyms.c
> @@ -331,12 +331,6 @@ static unsigned long get_symbol_pos(unsigned long addr,
>         unsigned long symbol_start = 0, symbol_end = 0;
>         unsigned long i, low, high, mid;
>
> -       /* This kernel should never had been booted. */
> -       if (!IS_ENABLED(CONFIG_KALLSYMS_BASE_RELATIVE))
> -               BUG_ON(!kallsyms_addresses);
> -       else
> -               BUG_ON(!kallsyms_offsets);

Even previously with weak definitions, wouldn't these values always be true?

> -
>         /* Do a binary search on the sorted kallsyms_addresses array. */
>         low = 0;
>         high = kallsyms_num_syms;
> diff --git a/kernel/kallsyms_internal.h b/kernel/kallsyms_internal.h
> index 27fabdcc40f57931..cf4124dbcc5b6d0e 100644
> --- a/kernel/kallsyms_internal.h
> +++ b/kernel/kallsyms_internal.h
> @@ -8,24 +8,17 @@
>   * These will be re-linked against their real values
>   * during the second link stage.
>   */
> -extern const unsigned long kallsyms_addresses[] __weak;
> -extern const int kallsyms_offsets[] __weak;
> -extern const u8 kallsyms_names[] __weak;
> +extern const unsigned long kallsyms_addresses[];
> +extern const int kallsyms_offsets[];
> +extern const u8 kallsyms_names[];
>
> -/*
> - * Tell the compiler that the count isn't in the small data section if the arch
> - * has one (eg: FRV).
> - */
> -extern const unsigned int kallsyms_num_syms
> -__section(".rodata") __attribute__((weak));
> -
> -extern const unsigned long kallsyms_relative_base
> -__section(".rodata") __attribute__((weak));
> +extern const unsigned int kallsyms_num_syms;
> +extern const unsigned long kallsyms_relative_base;
>
> -extern const char kallsyms_token_table[] __weak;
> -extern const u16 kallsyms_token_index[] __weak;
> +extern const char kallsyms_token_table[];
> +extern const u16 kallsyms_token_index[];
>
> -extern const unsigned int kallsyms_markers[] __weak;
> -extern const u8 kallsyms_seqs_of_names[] __weak;
> +extern const unsigned int kallsyms_markers[];
> +extern const u8 kallsyms_seqs_of_names[];
>
>  #endif // LINUX_KALLSYMS_INTERNAL_H_
> --
> 2.39.2
>


-- 
Thanks,
~Nick Desaulniers




[Index of Archives]     [Linux Kernel]     [Kernel Newbies]     [x86 Platform Driver]     [Netdev]     [Linux Wireless]     [Netfilter]     [Bugtraq]     [Linux Filesystems]     [Yosemite Discussion]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]

  Powered by Linux