Received: by 2002:ac0:8c8e:0:0:0:0:0 with SMTP id r14csp790343ima; Wed, 6 Feb 2019 08:23:26 -0800 (PST) X-Google-Smtp-Source: AHgI3Ib3ly2Mt3hv7vcoq74uMxlqTOMuTiFT6xK4uCQ22Fc0HpMf1rTn8yMb1NuYTT57NTV+LMTT X-Received: by 2002:a17:902:161:: with SMTP id 88mr11744295plb.306.1549470206293; Wed, 06 Feb 2019 08:23:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549470206; cv=none; d=google.com; s=arc-20160816; b=Fr2nyziI31wqC0s2iB7XVdffLzmOdTIvyN4RQJsotDfxr7WC2MI5MYYQTPDO395AOT aioogPYgtcYVaGusRee2Z/kC2XfgQbID4EqlLexICUWcNwYxBFoPt56vGvrtufrJwS4t VU5KTQgazbSZdMBmtAKFrZAN8fLmhOWPfT6+Ut8OS5CSKyP5z3Hg6HJAiZspSedz/8vn MwcQyLTHvoM5TZOeXDw8/8yNj2Y19m+lAApgYnmhrQ/W5GZ6sQd4U8b9kJSegO9HnMbH Uq6cObQezYgiFZnpk2ApPp/Gk66pCspiP66jv/4BXDOTdqwEItmGCr0NKK2utBD9LZS5 25Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=xs3UjPefeREr0pIXPymWQO9VhhZxWz0HOr7sMdXb3aY=; b=05bKTKkSjDfOoEnFH7DM9WLLS60GJt6AnEdDi9nzZSFot/V8dYipivF2i5l+67Zw6f 6BgQNN5VkQ8LERAj1bUqIULBigcxw1nV4eMAp9NzS+JqXeTrJZ2ul4801dcuDZb5k9U9 HecCQmddfG+o3Dqxb5N3coNMMTR5Hq3mlzKWGDtB9SCuVQh503FPXnd6ErJXoGmK2UY3 SqlGA70QPa/rocZwJJJ7T5II3cZQY1Lugj8YYNzDOHYGQl+gdFep7HcTEuKqS5S70nj6 CEDdQVrs3+DDOB8zSIygjj/wNz36PBX5ifJiG6EbTXNlWZ4lizwpOlgNFBSvo/mhZAMc dgdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f39si6276285plb.369.2019.02.06.08.23.09; Wed, 06 Feb 2019 08:23:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730733AbfBFQWS (ORCPT + 99 others); Wed, 6 Feb 2019 11:22:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:33326 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727212AbfBFQWR (ORCPT ); Wed, 6 Feb 2019 11:22:17 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 295922175B; Wed, 6 Feb 2019 16:22:15 +0000 (UTC) Date: Wed, 6 Feb 2019 11:22:13 -0500 From: Steven Rostedt To: Rick Edgecombe Cc: Andy Lutomirski , Ingo Molnar , linux-kernel@vger.kernel.org, x86@kernel.org, hpa@zytor.com, Thomas Gleixner , Borislav Petkov , Nadav Amit , Dave Hansen , Peter Zijlstra , linux_dti@icloud.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, akpm@linux-foundation.org, kernel-hardening@lists.openwall.com, linux-mm@kvack.org, will.deacon@arm.com, ard.biesheuvel@linaro.org, kristen@linux.intel.com, deneen.t.dock@intel.com, Nadav Amit Subject: Re: [PATCH 08/17] x86/ftrace: set trampoline pages as executable Message-ID: <20190206112213.2ec9dd5c@gandalf.local.home> In-Reply-To: <20190117003259.23141-9-rick.p.edgecombe@intel.com> References: <20190117003259.23141-1-rick.p.edgecombe@intel.com> <20190117003259.23141-9-rick.p.edgecombe@intel.com> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 16 Jan 2019 16:32:50 -0800 Rick Edgecombe wrote: > From: Nadav Amit > > Since alloc_module() will not set the pages as executable soon, we need > to do so for ftrace trampoline pages after they are allocated. > > For the time being, we do not change ftrace to use the text_poke() > interface. As a result, ftrace breaks still breaks W^X. > > Cc: Steven Rostedt > Signed-off-by: Nadav Amit > Signed-off-by: Rick Edgecombe > --- > arch/x86/kernel/ftrace.c | 9 +++++++++ > 1 file changed, 9 insertions(+) > > diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c > index 8257a59704ae..eb4a1937e72c 100644 > --- a/arch/x86/kernel/ftrace.c > +++ b/arch/x86/kernel/ftrace.c > @@ -742,6 +742,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) > unsigned long end_offset; > unsigned long op_offset; > unsigned long offset; > + unsigned long npages; > unsigned long size; > unsigned long retq; > unsigned long *ptr; > @@ -774,6 +775,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) > return 0; > > *tramp_size = size + RET_SIZE + sizeof(void *); > + npages = DIV_ROUND_UP(*tramp_size, PAGE_SIZE); > > /* Copy ftrace_caller onto the trampoline memory */ > ret = probe_kernel_read(trampoline, (void *)start_offset, size); > @@ -818,6 +820,13 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) > /* ALLOC_TRAMP flags lets us know we created it */ > ops->flags |= FTRACE_OPS_FL_ALLOC_TRAMP; > > + /* > + * Module allocation needs to be completed by making the page > + * executable. The page is still writable, which is a security hazard, > + * but anyhow ftrace breaks W^X completely. > + */ Perhaps we should set the page to non writable after the page is updated? And set it to writable only when we need to update it. As for this patch: Reviewed-by: Steven Rostedt (VMware) -- Steve > + set_memory_x((unsigned long)trampoline, npages); > + > return (unsigned long)trampoline; > fail: > tramp_free(trampoline, *tramp_size);