Received: by 2002:ac0:8c8e:0:0:0:0:0 with SMTP id r14csp892989ima; Wed, 6 Feb 2019 10:02:16 -0800 (PST) X-Google-Smtp-Source: AHgI3IYjPTvMWG+P/ty2SkdjwtM1SDfX08e/T/57vUldMv78VU1+0G0ySTucyiFKSPEY3/YPFaWM X-Received: by 2002:a63:3206:: with SMTP id y6mr10627125pgy.338.1549476136038; Wed, 06 Feb 2019 10:02:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549476136; cv=none; d=google.com; s=arc-20160816; b=ycPofDOKkhABPj/p+HtgPGZlZW7YceoQm+uLGAQMxjFh5s2+FGEHD7Jnq8/AJPMK0s HErMbSLdtoY3h6JcHdCuFjLzWZkEurI9rdtFhfDnApWy/NKKrsLN20N/SL4ufNVdFY+L OYsyMofHsuqzZMDkL4mwvv1qNgkyT9QHGnwTXCSgZzzMSsKzxk27spOVDXu+4E8/x5h+ UU9zIl724RDefBaTFtVwR3KvHvUq+8o7uekfuCYRoWD7VZx99SQSYBNOGOyX7vrinRSI a2y+P/gATxEzIWppovLldggM0b7nK1Qgdir6Ske7JlPKWZTqPoCS9AETw45kJxWfnGa2 gB6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=rYbgX2FNZSLFQiDq0Ih+9oGqomi8Dxzpd7WK0+FcTcQ=; b=ttN4Mi9JgwjPTv62AIqmRcO5BzxQNFT9ZvNgbn14k0HBNI18TsnhHHKeC2VXyCmAw0 s8YHUfrZkPVgf6GOTfAm1uix6ov7ncOKdECmwl/vnVW2w28lh+eaSuRfi55gjYabe+rO ZvvHiIY3PlutMpciF3BXtZfyQMjM12LJ9hyXpfJq3eXkof1WOAzfkKxVYMv6tFNAn12w mUkvQX4AhvD6FKDS4SGFxEGhCbJ1SgsmgoTfQy73bXFPGKhHjDH5sLf0fZqvQU3wPQUy hA11e7jrvgzBYCZTiYUQF1nXkTcnQFeG5q3GOeTG3vttvQaqjqNL/Gp0XpAZBo175jkc tztw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jxBVSrqh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l4si3238081pgr.346.2019.02.06.10.01.51; Wed, 06 Feb 2019 10:02:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jxBVSrqh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730099AbfBFRdl (ORCPT + 99 others); Wed, 6 Feb 2019 12:33:41 -0500 Received: from mail-pg1-f196.google.com ([209.85.215.196]:45872 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727594AbfBFRdl (ORCPT ); Wed, 6 Feb 2019 12:33:41 -0500 Received: by mail-pg1-f196.google.com with SMTP id y4so3180725pgc.12; Wed, 06 Feb 2019 09:33:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=rYbgX2FNZSLFQiDq0Ih+9oGqomi8Dxzpd7WK0+FcTcQ=; b=jxBVSrqhK2+6jA9mgt1ZG2E6Yi97wIPX6W+CP4vKddME0zOC5E6Nq1muZXBqDq66Ye VVAsjSUD9dScTXpLAZBgRw1MBsrpIoTC5JQhT21UolL971aHLI6k3RCW7jONQsJbBlzP t9jtC1tCPW113d7khRQ4pUr9iK6z6+Jl2znriGGF6Tc3h8tJm7WgEkq29wzTlX5g7Mg9 7qQk6+j5bVvHFcSvP+fLT9HshRbtp0RQyolyO61o12w+C/C+MMWVvqfybCZv/UsMV/AI BKEhQZUPTuOaO1k+dtte1NfawOt3RDQ2LvtZ9jMask9lAZN5wdlfaI5HXjrthV8o5cSn 2XNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=rYbgX2FNZSLFQiDq0Ih+9oGqomi8Dxzpd7WK0+FcTcQ=; b=SYsVM7QUyhCysuvVB0yUdZK7/URF+rK5JpLhsb/9KlekIXfyzsxuwHv3hz9fYgp8qk U82G/MaSONLfa4RzSDOUNbLA0cSoEKD8prqyJ4xru0XV/QizToYDt7vrlLAyUpa3hBqn Cfm56hlQtHKGzUD/ISD5hyqb881vwb+KJ9ybygZYuNGxqryUUQxMnCt8mBq4zXKIWlW/ ZRuJ8PpCVYtNHkAf/WmOLTjYrKKACSdy+3NHvmqTxM/RTANyn3cq2/W8NMhoEupvCX9C xU7MqEt1om21qhUFbqmTL8KZrRrDKhDG7liMoRqa8V54xeBItbb8Z/YM3YUm/88dR/wP jH/g== X-Gm-Message-State: AHQUAuY7qR7qlh3FNcracmHcPRd157zULVgFShopOGUDNOejhsqUFhzb wGeP2ADcjkjRRukyTVV0PHk= X-Received: by 2002:a65:62da:: with SMTP id m26mr10648561pgv.278.1549474419293; Wed, 06 Feb 2019 09:33:39 -0800 (PST) Received: from [10.33.115.182] ([66.170.99.1]) by smtp.gmail.com with ESMTPSA id a13sm436912pgw.34.2019.02.06.09.33.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 06 Feb 2019 09:33:38 -0800 (PST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\)) Subject: Re: [PATCH 08/17] x86/ftrace: set trampoline pages as executable From: Nadav Amit In-Reply-To: <20190206112213.2ec9dd5c@gandalf.local.home> Date: Wed, 6 Feb 2019 09:33:35 -0800 Cc: Rick Edgecombe , Andy Lutomirski , Ingo Molnar , LKML , X86 ML , "H. Peter Anvin" , Thomas Gleixner , Borislav Petkov , Dave Hansen , Peter Zijlstra , Damian Tometzki , linux-integrity , LSM List , Andrew Morton , Kernel Hardening , Linux-MM , Will Deacon , Ard Biesheuvel , Kristen Carlson Accardi , deneen.t.dock@intel.com Content-Transfer-Encoding: quoted-printable Message-Id: <5DFA1E3C-A335-4C4B-A86F-904A6CF6D871@gmail.com> References: <20190117003259.23141-1-rick.p.edgecombe@intel.com> <20190117003259.23141-9-rick.p.edgecombe@intel.com> <20190206112213.2ec9dd5c@gandalf.local.home> To: Steven Rostedt X-Mailer: Apple Mail (2.3445.102.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Feb 6, 2019, at 8:22 AM, Steven Rostedt = wrote: >=20 > On Wed, 16 Jan 2019 16:32:50 -0800 > Rick Edgecombe wrote: >=20 >> From: Nadav Amit >>=20 >> Since alloc_module() will not set the pages as executable soon, we = need >> to do so for ftrace trampoline pages after they are allocated. >>=20 >> For the time being, we do not change ftrace to use the text_poke() >> interface. As a result, ftrace breaks still breaks W^X. >>=20 >> Cc: Steven Rostedt >> Signed-off-by: Nadav Amit >> Signed-off-by: Rick Edgecombe >> --- >> arch/x86/kernel/ftrace.c | 9 +++++++++ >> 1 file changed, 9 insertions(+) >>=20 >> diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c >> index 8257a59704ae..eb4a1937e72c 100644 >> --- a/arch/x86/kernel/ftrace.c >> +++ b/arch/x86/kernel/ftrace.c >> @@ -742,6 +742,7 @@ create_trampoline(struct ftrace_ops *ops, = unsigned int *tramp_size) >> unsigned long end_offset; >> unsigned long op_offset; >> unsigned long offset; >> + unsigned long npages; >> unsigned long size; >> unsigned long retq; >> unsigned long *ptr; >> @@ -774,6 +775,7 @@ create_trampoline(struct ftrace_ops *ops, = unsigned int *tramp_size) >> return 0; >>=20 >> *tramp_size =3D size + RET_SIZE + sizeof(void *); >> + npages =3D DIV_ROUND_UP(*tramp_size, PAGE_SIZE); >>=20 >> /* Copy ftrace_caller onto the trampoline memory */ >> ret =3D probe_kernel_read(trampoline, (void *)start_offset, = size); >> @@ -818,6 +820,13 @@ create_trampoline(struct ftrace_ops *ops, = unsigned int *tramp_size) >> /* ALLOC_TRAMP flags lets us know we created it */ >> ops->flags |=3D FTRACE_OPS_FL_ALLOC_TRAMP; >>=20 >> + /* >> + * Module allocation needs to be completed by making the page >> + * executable. The page is still writable, which is a security = hazard, >> + * but anyhow ftrace breaks W^X completely. >> + */ >=20 > Perhaps we should set the page to non writable after the page is > updated? And set it to writable only when we need to update it. You remember that I sent you a patch that changed all these writes into text_poke() and you said that I should defer it until this series is = merged? > As for this patch: >=20 > Reviewed-by: Steven Rostedt (VMware) Thanks!