From patchwork Tue Jun 26 18:27:55 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 140071 Delivered-To: patch@linaro.org Received: by 2002:a2e:970d:0:0:0:0:0 with SMTP id r13-v6csp5572684lji; Tue, 26 Jun 2018 11:28:47 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIkuk1WBOE8oWvBJeBBo+55EE+SkFr3f7S93RjCnht2qu3s7bGnLfGeuSKC0BXlYhQLhFL3 X-Received: by 2002:a17:902:42c3:: with SMTP id h61-v6mr2718086pld.319.1530037727023; Tue, 26 Jun 2018 11:28:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530037727; cv=none; d=google.com; s=arc-20160816; b=PRsLa3DHCCs9Vdlnbm5f2SBxB11GwWliHbyUSCVkfgCz+waFSO7xSmBm4zZVGzkzzD BDk+GpDJRs744PcspHwj5cJEpzRaJ7smVW3fmTXGvQstIKRWQeNmMO3d68aWsv0ghE3L eczGQx/6vK0Tc7ARFdPZr3CYdDLjMHptsCLHiq+stXnX350OuvxwK/fKc6ine8zqsEl2 vhUezdIEUzr3aQOHpVW3szx231wOKZD7PTh3tN2qmK7vdlNdUZVG7JS8wn3wYsN32PoZ PkPTYVd+1JJrES12GxLq6fjRH1BGoZFsH37ATBtbOhYtyxL6DA72av1UYZqVznQvVnkF b5uQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=h/uH5uFPgIYctKtBHMqt1daYgUmBFyfBNK679IqD3Gs=; b=cDlmSYgIm++hWzAH40iojkrsTOFPZv7WREa1xDTMKFvgePcD0tdEgZNgwuySx+epYb D2FYD+c8SwOlv5iBkhHna5LvHDqNdUNOw+6E+eHEj+vccwk52eaDNvqtDJu7hEeAA5Ar gnCpFzob3c6NT7LQHqY4q/s1v2KVSdwOrMi3jt9cA/HtUeTCGg9P6d0X2AGV5y1NC+l7 HgTTwW9MCpbaUhc7QjbwkEjXn9yRCmLhEb62quwCbQ/QyU0/SGhIJRvnhrnqHBWFGBAw AbotkvUbDFIU36MOp3QU+rQOcB8tjE2j3b8RCjBesi8d9egGmpKS0XY0Uq4fZSra9PoU IPdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=josTfnd+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r20-v6si1820866pga.142.2018.06.26.11.28.46; Tue, 26 Jun 2018 11:28:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=josTfnd+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752763AbeFZS2o (ORCPT + 31 others); Tue, 26 Jun 2018 14:28:44 -0400 Received: from mail-wr0-f193.google.com ([209.85.128.193]:45050 "EHLO mail-wr0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750962AbeFZS2m (ORCPT ); Tue, 26 Jun 2018 14:28:42 -0400 Received: by mail-wr0-f193.google.com with SMTP id p12-v6so16575766wrn.11 for ; Tue, 26 Jun 2018 11:28:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=h/uH5uFPgIYctKtBHMqt1daYgUmBFyfBNK679IqD3Gs=; b=josTfnd+C5MIScuq0oMZ9FaB0tVijFFrF9itzRljgDF8hlQBicyYObkrR92Qhw3a9V N7RRPDVjG2mYrptx9lwbOA5EsrbevIp6d295sJfKttzJ3uxE8mPpLQfnnpJuONF7jczU PPg5Ey51g4WW4Y2KoNW5cT0Jk9YYuZNDmkCGA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=h/uH5uFPgIYctKtBHMqt1daYgUmBFyfBNK679IqD3Gs=; b=rL62MzTaNhe7b4wznWlDw2kUTkqFev1IAhRa6neF1A4BiLz/5BbCaJpfc8Ns6HCxLg UZO43vqfMXDzhfk+FIp9t8eQD8DVeopssVLvkneNHl7vXV4ZdGU8RWy82EJdFufuAPHI FcTSq8yNhIO3DUZg9+Ctah7E/WWdiTb/VEMcADeznhpQ4L4hzCx+K+bVRPW42bpMN4BF l1MlwGAlK3u0sML6jbxzScvuT/9oLCF6SFaXjIsFBcMw0kpEGV09gM6PXh/rZO5E9bdM iogt+PKjY2vw6sbk0Ga3mgL/kls1obDIzBnkF5mc9z2gVUTMCmp1o+QYIUET/rPYVnkQ q7Cg== X-Gm-Message-State: APt69E3S6//V4ufNpJYMNau7dmWxqFUTDCaHGmxW1Ph/ZsD8RSCU/t59 XgUqQBMNbiRsE/+vGLbhv4rLR/Z3K7U= X-Received: by 2002:adf:9d93:: with SMTP id p19-v6mr2507676wre.12.1530037720726; Tue, 26 Jun 2018 11:28:40 -0700 (PDT) Received: from rev02.home ([2a01:cb1d:112:6f00:d037:e907:f0a2:a5ea]) by smtp.gmail.com with ESMTPSA id s17-v6sm1707664wmc.34.2018.06.26.11.28.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Jun 2018 11:28:39 -0700 (PDT) From: Ard Biesheuvel To: linux-kernel@vger.kernel.org Cc: Ard Biesheuvel , Arnd Bergmann , Kees Cook , Will Deacon , Michael Ellerman , Thomas Garnier , Thomas Gleixner , "Serge E. Hallyn" , Bjorn Helgaas , Benjamin Herrenschmidt , Russell King , Paul Mackerras , Catalin Marinas , Petr Mladek , Ingo Molnar , James Morris , Andrew Morton , Nicolas Pitre , Josh Poimboeuf , Steven Rostedt , Sergey Senozhatsky , Linus Torvalds , Jessica Yu , linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, x86@kernel.org Subject: [PATCH v9 0/6] add support for relative references in special sections Date: Tue, 26 Jun 2018 20:27:55 +0200 Message-Id: <20180626182802.19932-1-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This adds support for emitting special sections such as initcall arrays, PCI fixups and tracepoints as relative references rather than absolute references. This reduces the size by 50% on 64-bit architectures, but more importantly, it removes the need for carrying relocation metadata for these sections in relocatable kernels (e.g., for KASLR) that needs to be fixed up at boot time. On arm64, this reduces the vmlinux footprint of such a reference by 8x (8 byte absolute reference + 24 byte RELA entry vs 4 byte relative reference) Patch #3 was sent out before as a single patch. This series supersedes the previous submission. This version makes relative ksymtab entries dependent on the new Kconfig symbol HAVE_ARCH_PREL32_RELOCATIONS rather than trying to infer from kbuild test robot replies for which architectures it should be blacklisted. Patch #1 introduces the new Kconfig symbol HAVE_ARCH_PREL32_RELOCATIONS, and sets it for the main architectures that are expected to benefit the most from this feature, i.e., 64-bit architectures or ones that use runtime relocations. Patch #2 add support for #define'ing __DISABLE_EXPORTS to get rid of ksymtab/kcrctab sections in decompressor and EFI stub objects when rebuilding existing C files to run in a different context. Patches #4 - #6 implement relative references for initcalls, PCI fixups and tracepoints, respectively, all of which produce sections with order ~1000 entries on an arm64 defconfig kernel with tracing enabled. This means we save about 28 KB of vmlinux space for each of these patches. [From the v7 series blurb, which included the jump_label patches as well]: For the arm64 kernel, all patches combined reduce the memory footprint of vmlinux by about 1.3 MB (using a config copied from Ubuntu that has KASLR enabled), of which ~1 MB is the size reduction of the RELA section in .init, and the remaining 300 KB is reduction of .text/.data. Branch: git://git.kernel.org/pub/scm/linux/kernel/git/ardb/linux.git relative-special-sections-v9 Changes since v8: - add Nico's ack (#2) - drop 'const' qualifier from __ADDRESSABLE(sym) to prevent mismatching attributes for the .discard section (#3) - drop all uses of VMLINUX_SYMBOL_STR(), which is on its way out (#3 - #6) Changes since v7: - dropped the jump_label patches, these will be revisited in a separate series - reorder __DISABLE_EXPORTS with __KSYM_DEPS__ check in #2 - use offset_to_ptr() helper function to abstract the relative pointer conversion [int *off -> (ulong)off + *off] (#3 - #6) - rebase onto v4.16-rc3 Changes since v6: - drop S390 from patch #1 introducing HAVE_ARCH_PREL32_RELOCATIONS: kbuild robot threw me some s390 curveballs, and given that s390 does not define CONFIG_RELOCATABLE in the first place, it does not benefit as much from relative references as arm64, x86 and power do - add patch to allow symbol exports to be disabled at compilation unit granularity (#2) - get rid of arm64 vmlinux.lds.S hunk to ensure code generated by __ADDRESSABLE gets discarded from the EFI stub - it is no longer needed after adding #2 (#1) - change _ADDRESSABLE() to emit a data reference, not a code reference - this is another simplification made possible by patch #2 (#3) - add Steven's ack to #6 - split x86 jump_label patch into two (#9, #10) Changes since v5: - add missing jump_label prototypes to s390 jump_label.h (#6) - fix inverted condition in call to jump_entry_is_module_init() (#6) Changes since v4: - add patches to convert x86 and arm64 to use relative references for jump tables (#6 - #8) - rename PCI patch and add Bjorn's ack (#4) - rebase onto v4.15-rc5 Changes since v3: - fix module unload issue in patch #5 reported by Jessica, by reusing the updated routine for_each_tracepoint_range() for the quiescent check at module unload time; this requires this routine to be moved before tracepoint_module_going() in kernel/tracepoint.c - add Jessica's ack to #2 - rebase onto v4.14-rc1 Changes since v2: - Revert my slightly misguided attempt to appease checkpatch, which resulted in needless churn and worse code. This v3 is based on v1 with a few tweaks that were actually reasonable checkpatch warnings: unnecessary braces (as pointed out by Ingo) and other minor whitespace misdemeanors. Changes since v1: - Remove checkpatch errors to the extent feasible: in some cases, this involves moving extern declarations into C files, and switching to struct definitions rather than typedefs. Some errors are impossible to fix: please find the remaining ones after the diffstat. - Used 'int' instead if 'signed int' for the various offset fields: there is no ambiguity between architectures regarding its signedness (unlike 'char') - Refactor the different patches to be more uniform in the way they define the section entry type and accessors in the .h file, and avoid the need to add #ifdefs to the C code. Cc: Arnd Bergmann Cc: Kees Cook Cc: Will Deacon Cc: Michael Ellerman Cc: Thomas Garnier Cc: Thomas Gleixner Cc: "Serge E. Hallyn" Cc: Bjorn Helgaas Cc: Benjamin Herrenschmidt Cc: Russell King Cc: Paul Mackerras Cc: Catalin Marinas Cc: Petr Mladek Cc: Ingo Molnar Cc: James Morris Cc: Andrew Morton Cc: Nicolas Pitre Cc: Josh Poimboeuf Cc: Steven Rostedt Cc: Sergey Senozhatsky Cc: Linus Torvalds Cc: Jessica Yu Cc: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org Cc: linuxppc-dev@lists.ozlabs.org Cc: x86@kernel.org Ard Biesheuvel (6): arch: enable relative relocations for arm64, power and x86 module: allow symbol exports to be disabled module: use relative references for __ksymtab entries init: allow initcall tables to be emitted using relative references PCI: Add support for relative addressing in quirk tables kernel: tracepoints: add support for relative references arch/Kconfig | 10 ++++ arch/arm64/Kconfig | 1 + arch/powerpc/Kconfig | 1 + arch/x86/Kconfig | 1 + arch/x86/boot/compressed/kaslr.c | 5 +- arch/x86/include/asm/Kbuild | 1 + arch/x86/include/asm/export.h | 5 -- drivers/firmware/efi/libstub/Makefile | 3 +- drivers/pci/quirks.c | 12 +++-- include/asm-generic/export.h | 12 ++++- include/linux/compiler.h | 19 +++++++ include/linux/export.h | 57 +++++++++++++++----- include/linux/init.h | 44 +++++++++++---- include/linux/pci.h | 20 +++++++ include/linux/tracepoint.h | 19 +++++-- init/main.c | 32 +++++------ kernel/module.c | 32 ++++++++--- kernel/printk/printk.c | 16 +++--- kernel/tracepoint.c | 49 +++++++++-------- security/security.c | 17 +++--- 20 files changed, 255 insertions(+), 101 deletions(-) delete mode 100644 arch/x86/include/asm/export.h -- 2.11.0 Reviewed-by: Will Deacon Acked-by: Ingo Molnar