Message ID | 1442311903-19213-1-git-send-email-ard.biesheuvel@linaro.org |
---|---|
State | New |
Headers | show |
On Tue, Sep 15, 2015 at 11:11:43AM +0100, Ard Biesheuvel wrote: > Since arm64 does not use a builtin decompressor, the EFI stub is built > into the kernel proper. So far, this has been working fine, but actually, > since the stub is in fact a PE/COFF relocatable binary that is executed > at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we > should not be seamlessly sharing code with the kernel proper, which is a > position dependent executable linked at a high virtual offset. > > So instead, separate the contents of libstub and its dependencies, by > putting them into their own namespace by prefixing all of its symbols > with __efistub. This way, we have tight control over what parts of the > kernel proper are referenced by the stub. Could we add an __efistub annotation to spit out warnings if the stub calls into unexpected kernel code, like we do for __init/__ref? Will
On 15 September 2015 at 16:46, Will Deacon <will.deacon@arm.com> wrote: > On Tue, Sep 15, 2015 at 11:11:43AM +0100, Ard Biesheuvel wrote: >> Since arm64 does not use a builtin decompressor, the EFI stub is built >> into the kernel proper. So far, this has been working fine, but actually, >> since the stub is in fact a PE/COFF relocatable binary that is executed >> at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we >> should not be seamlessly sharing code with the kernel proper, which is a >> position dependent executable linked at a high virtual offset. >> >> So instead, separate the contents of libstub and its dependencies, by >> putting them into their own namespace by prefixing all of its symbols >> with __efistub. This way, we have tight control over what parts of the >> kernel proper are referenced by the stub. > > Could we add an __efistub annotation to spit out warnings if the stub > calls into unexpected kernel code, like we do for __init/__ref? > Currently, it will break the build rather than warn if you use a disallowed symbol, which I think is not unreasonable. But I suppose that the objcopy step in this patch could rename the sections to .efistub.xxx sections, which would allow us to reuse some of the section mismatch code. However, this would involve marking things like the generic string and memcpy routines __efistub as well, which I think may be too much. Also, note that the logic is inverted here: with __init, we disallow normal code to call __init functions, but with __efistub, it will be the other way around, which may be more difficult to accomplish (Rutland and I did discuss this option when we talked about this over IRC)
On 15 September 2015 at 17:24, Ard Biesheuvel <ard.biesheuvel@linaro.org> wrote: > On 15 September 2015 at 16:46, Will Deacon <will.deacon@arm.com> wrote: >> On Tue, Sep 15, 2015 at 11:11:43AM +0100, Ard Biesheuvel wrote: >>> Since arm64 does not use a builtin decompressor, the EFI stub is built >>> into the kernel proper. So far, this has been working fine, but actually, >>> since the stub is in fact a PE/COFF relocatable binary that is executed >>> at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we >>> should not be seamlessly sharing code with the kernel proper, which is a >>> position dependent executable linked at a high virtual offset. >>> >>> So instead, separate the contents of libstub and its dependencies, by >>> putting them into their own namespace by prefixing all of its symbols >>> with __efistub. This way, we have tight control over what parts of the >>> kernel proper are referenced by the stub. >> >> Could we add an __efistub annotation to spit out warnings if the stub >> calls into unexpected kernel code, like we do for __init/__ref? >> > > Currently, it will break the build rather than warn if you use a > disallowed symbol, which I think is not unreasonable. > > But I suppose that the objcopy step in this patch could rename the > sections to .efistub.xxx sections, which would allow us to reuse some > of the section mismatch code. > However, this would involve marking things like the generic string and > memcpy routines __efistub as well, which I think may be too much. > Also, note that the logic is inverted here: with __init, we disallow > normal code to call __init functions, but with __efistub, it will be > the other way around, which may be more difficult to accomplish > (Rutland and I did discuss this option when we talked about this over > IRC) > OK, I have given this a go, and as it turns out, it implies that we go and mark generic pieces of lib/ as __section(.text.efistubok) in order for modpost.c to accept it. Tweaking modpost.c itself seems quite doable, since the logic is fairly flexible and can easily be augmented to complain about unauthorized references from the stub to the kernel proper. So what we could do is fold libfdt and lib/sort.c (which are the primary generic dependencies) into the stub, but we would still need to retain the symbol prefixing bit to prevent the stub's symbols from clashing with the ones from the kernel proper. And with the symbol prefixing in place, we have something that is even stronger than section mismatch, which is to error out on undefined references rather than warn about section mismatches. I think the current approach is better, but only if we agree that we should do something in the first place. (Currently, there are no known issues, just the awareness that things are not quite as tidy as they should be)
Hi Ard, On Thu, Sep 17, 2015 at 11:51:07AM +0100, Ard Biesheuvel wrote: > On 15 September 2015 at 17:24, Ard Biesheuvel <ard.biesheuvel@linaro.org> wrote: > > On 15 September 2015 at 16:46, Will Deacon <will.deacon@arm.com> wrote: > >> On Tue, Sep 15, 2015 at 11:11:43AM +0100, Ard Biesheuvel wrote: > >>> Since arm64 does not use a builtin decompressor, the EFI stub is built > >>> into the kernel proper. So far, this has been working fine, but actually, > >>> since the stub is in fact a PE/COFF relocatable binary that is executed > >>> at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we > >>> should not be seamlessly sharing code with the kernel proper, which is a > >>> position dependent executable linked at a high virtual offset. > >>> > >>> So instead, separate the contents of libstub and its dependencies, by > >>> putting them into their own namespace by prefixing all of its symbols > >>> with __efistub. This way, we have tight control over what parts of the > >>> kernel proper are referenced by the stub. > >> > >> Could we add an __efistub annotation to spit out warnings if the stub > >> calls into unexpected kernel code, like we do for __init/__ref? > >> > > > > Currently, it will break the build rather than warn if you use a > > disallowed symbol, which I think is not unreasonable. > > > > But I suppose that the objcopy step in this patch could rename the > > sections to .efistub.xxx sections, which would allow us to reuse some > > of the section mismatch code. > > However, this would involve marking things like the generic string and > > memcpy routines __efistub as well, which I think may be too much. > > Also, note that the logic is inverted here: with __init, we disallow > > normal code to call __init functions, but with __efistub, it will be > > the other way around, which may be more difficult to accomplish > > (Rutland and I did discuss this option when we talked about this over > > IRC) > > > > OK, I have given this a go, and as it turns out, it implies that we go > and mark generic pieces of lib/ as __section(.text.efistubok) in order > for modpost.c to accept it. Tweaking modpost.c itself seems quite > doable, since the logic is fairly flexible and can easily be augmented > to complain about unauthorized references from the stub to the kernel > proper. > > So what we could do is fold libfdt and lib/sort.c (which are the > primary generic dependencies) into the stub, but we would still need > to retain the symbol prefixing bit to prevent the stub's symbols from > clashing with the ones from the kernel proper. And with the symbol > prefixing in place, we have something that is even stronger than > section mismatch, which is to error out on undefined references rather > than warn about section mismatches. > > I think the current approach is better, but only if we agree that we > should do something in the first place. (Currently, there are no known > issues, just the awareness that things are not quite as tidy as they > should be) I agree, but thanks for looking into it. The only downside I still see with symbol namespacing is that the error produced won't be as obvious as something akin to a section mismatch, but then again, it's mainly you hacking on the stub so it's not really an issue :) Will
On 17 September 2015 at 09:09, Will Deacon <will.deacon@arm.com> wrote: > Hi Ard, > > On Thu, Sep 17, 2015 at 11:51:07AM +0100, Ard Biesheuvel wrote: >> On 15 September 2015 at 17:24, Ard Biesheuvel <ard.biesheuvel@linaro.org> wrote: >> > On 15 September 2015 at 16:46, Will Deacon <will.deacon@arm.com> wrote: >> >> On Tue, Sep 15, 2015 at 11:11:43AM +0100, Ard Biesheuvel wrote: >> >>> Since arm64 does not use a builtin decompressor, the EFI stub is built >> >>> into the kernel proper. So far, this has been working fine, but actually, >> >>> since the stub is in fact a PE/COFF relocatable binary that is executed >> >>> at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we >> >>> should not be seamlessly sharing code with the kernel proper, which is a >> >>> position dependent executable linked at a high virtual offset. >> >>> >> >>> So instead, separate the contents of libstub and its dependencies, by >> >>> putting them into their own namespace by prefixing all of its symbols >> >>> with __efistub. This way, we have tight control over what parts of the >> >>> kernel proper are referenced by the stub. >> >> >> >> Could we add an __efistub annotation to spit out warnings if the stub >> >> calls into unexpected kernel code, like we do for __init/__ref? >> >> >> > >> > Currently, it will break the build rather than warn if you use a >> > disallowed symbol, which I think is not unreasonable. >> > >> > But I suppose that the objcopy step in this patch could rename the >> > sections to .efistub.xxx sections, which would allow us to reuse some >> > of the section mismatch code. >> > However, this would involve marking things like the generic string and >> > memcpy routines __efistub as well, which I think may be too much. >> > Also, note that the logic is inverted here: with __init, we disallow >> > normal code to call __init functions, but with __efistub, it will be >> > the other way around, which may be more difficult to accomplish >> > (Rutland and I did discuss this option when we talked about this over >> > IRC) >> > >> >> OK, I have given this a go, and as it turns out, it implies that we go >> and mark generic pieces of lib/ as __section(.text.efistubok) in order >> for modpost.c to accept it. Tweaking modpost.c itself seems quite >> doable, since the logic is fairly flexible and can easily be augmented >> to complain about unauthorized references from the stub to the kernel >> proper. >> >> So what we could do is fold libfdt and lib/sort.c (which are the >> primary generic dependencies) into the stub, but we would still need >> to retain the symbol prefixing bit to prevent the stub's symbols from >> clashing with the ones from the kernel proper. And with the symbol >> prefixing in place, we have something that is even stronger than >> section mismatch, which is to error out on undefined references rather >> than warn about section mismatches. >> >> I think the current approach is better, but only if we agree that we >> should do something in the first place. (Currently, there are no known >> issues, just the awareness that things are not quite as tidy as they >> should be) > > I agree, but thanks for looking into it. The only downside I still see > with symbol namespacing is that the error produced won't be as obvious > as something akin to a section mismatch, but then again, it's mainly you > hacking on the stub so it's not really an issue :) > OK, so it seems we are mostly aligned with regard to the solution this patch proposes. Perhaps we need to discuss whether we feel the problem needs solving in the first place. To elaborate a bit, the concern is that the EFI stub, which executes in the context of the UEFI boot services environment, should be allowed to access random other code bits of the kernel that are built to be executed from a virtual offset that is not set up yet when UEFI runs. At the moment, this works fine, since the AArch64 small code model uses relative references primarily, and we happen not to be relying on any static data structures containing pointers. In fact, using the -fpic model (as I do in this patch for the stub components), which naively seems more appropriate for code that needs to execute at an a priori unknown offset, is very likely to make things worse rather than better, since the default visibility and ELF symbol preemption rules implemented by GCC mandate that all references to externally visible (i.e., non-static global) variables are preemptible, which means all external symbol references must go via [absolute] GOT entries. Since -fpic is not helping to prevent absolute references from being emitted, I should probably remove it from this patch. That means that the sole remaining purpose is to control which core kernel code is referenced by the stub, not to build the stub code itself in a different way. Thoughts, please?
diff --git a/arch/arm64/kernel/Makefile b/arch/arm64/kernel/Makefile index 22dc9bc781be..7b17f6245f1e 100644 --- a/arch/arm64/kernel/Makefile +++ b/arch/arm64/kernel/Makefile @@ -20,6 +20,14 @@ arm64-obj-y := debug-monitors.o entry.o irq.o fpsimd.o \ cpufeature.o alternative.o cacheinfo.o \ smp.o smp_spin_table.o topology.o +stub-obj := efi-stub.o efi-entry.o +extra-y := $(stub-obj) +stub-obj := $(patsubst %.o,%.stub.o,$(stub-obj)) + +OBJCOPYFLAGS := --prefix-symbols=__efistub_ +$(obj)/%.stub.o: $(obj)/%.o FORCE + $(call if_changed,objcopy) + arm64-obj-$(CONFIG_COMPAT) += sys32.o kuser32.o signal32.o \ sys_compat.o entry32.o \ ../../arm/kernel/opcodes.o @@ -32,7 +40,7 @@ arm64-obj-$(CONFIG_CPU_PM) += sleep.o suspend.o arm64-obj-$(CONFIG_CPU_IDLE) += cpuidle.o arm64-obj-$(CONFIG_JUMP_LABEL) += jump_label.o arm64-obj-$(CONFIG_KGDB) += kgdb.o -arm64-obj-$(CONFIG_EFI) += efi.o efi-stub.o efi-entry.o +arm64-obj-$(CONFIG_EFI) += efi.o $(stub-obj) arm64-obj-$(CONFIG_PCI) += pci.o arm64-obj-$(CONFIG_ARMV8_DEPRECATED) += armv8_deprecated.o arm64-obj-$(CONFIG_ACPI) += acpi.o @@ -40,7 +48,7 @@ arm64-obj-$(CONFIG_ACPI) += acpi.o obj-y += $(arm64-obj-y) vdso/ obj-m += $(arm64-obj-m) head-y := head.o -extra-y := $(head-y) vmlinux.lds +extra-y += $(head-y) vmlinux.lds # vDSO - this must be built first to generate the symbol offsets $(call objectify,$(arm64-obj-y)): $(obj)/vdso/vdso-offsets.h diff --git a/arch/arm64/kernel/efi-entry.S b/arch/arm64/kernel/efi-entry.S index 8ce9b0577442..a773db92908b 100644 --- a/arch/arm64/kernel/efi-entry.S +++ b/arch/arm64/kernel/efi-entry.S @@ -29,7 +29,7 @@ * we want to be. The kernel image wants to be placed at TEXT_OFFSET * from start of RAM. */ -ENTRY(efi_stub_entry) +ENTRY(entry) /* * Create a stack frame to save FP/LR with extra space * for image_addr variable passed to efi_entry(). @@ -86,8 +86,8 @@ ENTRY(efi_stub_entry) * entries for the VA range of the current image, so no maintenance is * necessary. */ - adr x0, efi_stub_entry - adr x1, efi_stub_entry_end + adr x0, entry + adr x1, entry_end sub x1, x1, x0 bl __flush_dcache_area @@ -120,5 +120,5 @@ efi_load_fail: ldp x29, x30, [sp], #32 ret -efi_stub_entry_end: -ENDPROC(efi_stub_entry) +entry_end: +ENDPROC(entry) diff --git a/arch/arm64/kernel/head.S b/arch/arm64/kernel/head.S index a055be6125cf..e8f52943ac65 100644 --- a/arch/arm64/kernel/head.S +++ b/arch/arm64/kernel/head.S @@ -120,8 +120,8 @@ efi_head: #endif #ifdef CONFIG_EFI - .globl stext_offset - .set stext_offset, stext - efi_head + .globl __efistub_stext_offset + .set __efistub_stext_offset, stext - efi_head .align 3 pe_header: .ascii "PE" @@ -144,8 +144,8 @@ optional_header: .long _end - stext // SizeOfCode .long 0 // SizeOfInitializedData .long 0 // SizeOfUninitializedData - .long efi_stub_entry - efi_head // AddressOfEntryPoint - .long stext_offset // BaseOfCode + .long __efistub_entry - efi_head // AddressOfEntryPoint + .long __efistub_stext_offset // BaseOfCode extra_header_fields: .quad 0 // ImageBase @@ -162,7 +162,7 @@ extra_header_fields: .long _end - efi_head // SizeOfImage // Everything before the kernel image is considered part of the header - .long stext_offset // SizeOfHeaders + .long __efistub_stext_offset // SizeOfHeaders .long 0 // CheckSum .short 0xa // Subsystem (EFI application) .short 0 // DllCharacteristics @@ -207,9 +207,9 @@ section_table: .byte 0 .byte 0 // end of 0 padding of section name .long _end - stext // VirtualSize - .long stext_offset // VirtualAddress + .long __efistub_stext_offset // VirtualAddress .long _edata - stext // SizeOfRawData - .long stext_offset // PointerToRawData + .long __efistub_stext_offset // PointerToRawData .long 0 // PointerToRelocations (0 for executables) .long 0 // PointerToLineNumbers (0 for executables) diff --git a/arch/arm64/kernel/image.h b/arch/arm64/kernel/image.h index 8fae0756e175..0475aef621ff 100644 --- a/arch/arm64/kernel/image.h +++ b/arch/arm64/kernel/image.h @@ -59,4 +59,30 @@ _kernel_offset_le = DATA_LE64(TEXT_OFFSET); \ _kernel_flags_le = DATA_LE64(__HEAD_FLAGS); +#ifdef CONFIG_EFI + +/* + * The EFI stub has its own symbol namespace prefixed by __efistub_, to + * isolate it from the kernel proper. The following symbols are legally + * accessed by the stub, so provide some aliases to make them accessible. + * Only include data symbols here, or text symbols of functions that are + * known to be safe when executed at another offset than they were linked at. + */ +__efistub_memcmp = memcmp; +__efistub_memchr = memchr; +__efistub_memcpy = memcpy; +__efistub_memmove = memmove; +__efistub_memset = memset; +__efistub_strlen = strlen; +__efistub_strncmp = strncmp; +__efistub_strstr = strstr; +__efistub___flush_dcache_area = __flush_dcache_area; + +__efistub_linux_banner = linux_banner; +__efistub__text = _text; +__efistub__end = _end; +__efistub__edata = _edata; + +#endif + #endif /* __ASM_IMAGE_H */ diff --git a/drivers/firmware/efi/libstub/Makefile b/drivers/firmware/efi/libstub/Makefile index 816dbe9f4b82..5de9ca0d3ead 100644 --- a/drivers/firmware/efi/libstub/Makefile +++ b/drivers/firmware/efi/libstub/Makefile @@ -10,10 +10,12 @@ cflags-$(CONFIG_X86) += -m$(BITS) -D__KERNEL__ $(LINUX_INCLUDE) -O2 \ -fPIC -fno-strict-aliasing -mno-red-zone \ -mno-mmx -mno-sse -DDISABLE_BRANCH_PROFILING -cflags-$(CONFIG_ARM64) := $(subst -pg,,$(KBUILD_CFLAGS)) +cflags-$(CONFIG_ARM64) := $(subst -pg,,$(KBUILD_CFLAGS)) -fpic cflags-$(CONFIG_ARM) := $(subst -pg,,$(KBUILD_CFLAGS)) \ -fno-builtin -fpic -mno-single-pic-base +cflags-$(CONFIG_EFI_PARAMS_FROM_FDT) += -I$(srctree)/scripts/dtc/libfdt + KBUILD_CFLAGS := $(cflags-y) \ $(call cc-option,-ffreestanding) \ $(call cc-option,-fno-stack-protector) @@ -22,7 +24,15 @@ GCOV_PROFILE := n KASAN_SANITIZE := n lib-y := efi-stub-helper.o -lib-$(CONFIG_EFI_ARMSTUB) += arm-stub.o fdt.o + +# include the stub's generic dependencies from lib/ when building for ARM/arm64 +arm-deps := fdt_rw.c fdt_ro.c fdt_wip.c fdt.c fdt_empty_tree.c fdt_sw.c sort.c + +$(obj)/lib-%.o: $(srctree)/lib/%.c FORCE + $(call if_changed_rule,cc_o_c) + +lib-$(CONFIG_EFI_ARMSTUB) += arm-stub.o fdt.o \ + $(patsubst %.c,lib-%.o,$(arm-deps)) # # arm64 puts the stub in the kernel proper, which will unnecessarily retain all @@ -34,6 +44,6 @@ lib-$(CONFIG_EFI_ARMSTUB) += arm-stub.o fdt.o extra-$(CONFIG_ARM64) := $(lib-y) lib-$(CONFIG_ARM64) := $(patsubst %.o,%.init.o,$(lib-y)) -OBJCOPYFLAGS := --prefix-alloc-sections=.init +OBJCOPYFLAGS := --prefix-alloc-sections=.init --prefix-symbols=__efistub_ $(obj)/%.init.o: $(obj)/%.o FORCE $(call if_changed,objcopy) diff --git a/drivers/firmware/efi/libstub/fdt.c b/drivers/firmware/efi/libstub/fdt.c index ef5d764e2a27..b04cb468d79f 100644 --- a/drivers/firmware/efi/libstub/fdt.c +++ b/drivers/firmware/efi/libstub/fdt.c @@ -16,6 +16,14 @@ #include "efistub.h" +/* + * We want the stub to access linux_banner via a relative reference and not via + * the GOT. Since the default visibility set on the GCC command line does not + * apply to external declarations, we need to add it explicitly here (or via + * a pragma). + */ +extern __attribute__((visibility("hidden"))) const char linux_banner[]; + efi_status_t update_fdt(efi_system_table_t *sys_table, void *orig_fdt, unsigned long orig_fdt_size, void *fdt, int new_fdt_size, char *cmdline_ptr,
Since arm64 does not use a builtin decompressor, the EFI stub is built into the kernel proper. So far, this has been working fine, but actually, since the stub is in fact a PE/COFF relocatable binary that is executed at an unknown offset in the 1:1 mapping provided by the UEFI firmware, we should not be seamlessly sharing code with the kernel proper, which is a position dependent executable linked at a high virtual offset. So instead, separate the contents of libstub and its dependencies, by putting them into their own namespace by prefixing all of its symbols with __efistub. This way, we have tight control over what parts of the kernel proper are referenced by the stub. Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> --- arch/arm64/kernel/Makefile | 12 +++++++-- arch/arm64/kernel/efi-entry.S | 10 ++++---- arch/arm64/kernel/head.S | 14 +++++------ arch/arm64/kernel/image.h | 26 ++++++++++++++++++++ drivers/firmware/efi/libstub/Makefile | 16 +++++++++--- drivers/firmware/efi/libstub/fdt.c | 8 ++++++ 6 files changed, 69 insertions(+), 17 deletions(-)