Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2739106yba; Mon, 22 Apr 2019 12:03:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpUQn5MrmTQ8Q6fXG4d+JhlBqR5FyQYdo7MQ/2nPbmhYIUHHDllxDLdAyMP1f2mr03Ru9u X-Received: by 2002:a65:5184:: with SMTP id h4mr20524225pgq.109.1555959838961; Mon, 22 Apr 2019 12:03:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555959838; cv=none; d=google.com; s=arc-20160816; b=hprsHw9Zgf1uL19d7ZpQ4XxzUgBDa2fZDMVbe9hLpDSfcja2r9w8JTWq7zJWGQn6/g pavIlT1HsSnjgQLdcaGmTqphMHaMFo80X9+yo6ChXaXbi51aoOTVbJ9vL/LVzDceHMH0 MZmLWMDWQL1HpWbGwY5XCm2aVXkICl84+5+P1XsNXfzvBCbsjabEF9YhXoeOFraZx5LC ++d1b4SK2XDZBf5F4fLVDVelO7j4hK36kKGHpXAgKS+nfSFIiDvQz1XUxoPUEtVca0em a8jQq3jl9+gl2JbxNwCS6WDGGnld/5+gy05B/CsD9v6k9xXMpEoESMXCtGwqtk0K+5Ht hZKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=CLKl6NZzJuOK2yM4IgvyVy0XzBWA5gDBiZYSHfLNQ00=; b=Fz34N/uQum86/yvbUZrukxvW8yj5ZM9Tj4Anm9ycgZVIR+yU5EixZg7z+9scRutHKm NS6pV0g8jmX4nfH7ppYGxmIuUVOhKL3iMD6tRh3Bs9j4TZrRhmTzuDeq4FcM9+XfXHvv qb3UW6UPFSajTkovZY8rKsVZKfrixeUbCV+loNoaAVIkYKnnZ2JRmgeabT9QAwyWwiXd VqUpIm/nhE5JomrVy39pljZguwVlhmKPDO/zltGecVf9UAjsa8bFsy/ZtLa4au8Gu+bp pDuC7G2iiTj39FoatZ9rQL09lOrswmqR6ktQdxMRD859B2nT+SOK7dQKMzjE2PEGkri+ 0InQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k11si14091768pfa.163.2019.04.22.12.03.43; Mon, 22 Apr 2019 12:03:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728736AbfDVTAQ (ORCPT + 99 others); Mon, 22 Apr 2019 15:00:16 -0400 Received: from mga11.intel.com ([192.55.52.93]:60347 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728710AbfDVS6p (ORCPT ); Mon, 22 Apr 2019 14:58:45 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Apr 2019 11:58:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,382,1549958400"; d="scan'208";a="136417143" Received: from linksys13920.jf.intel.com (HELO rpedgeco-DESK5.jf.intel.com) ([10.54.75.11]) by orsmga008.jf.intel.com with ESMTP; 22 Apr 2019 11:58:41 -0700 From: Rick Edgecombe To: Borislav Petkov , Andy Lutomirski , Ingo Molnar Cc: linux-kernel@vger.kernel.org, x86@kernel.org, hpa@zytor.com, Thomas Gleixner , Nadav Amit , Dave Hansen , Peter Zijlstra , linux_dti@icloud.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, akpm@linux-foundation.org, kernel-hardening@lists.openwall.com, linux-mm@kvack.org, will.deacon@arm.com, ard.biesheuvel@linaro.org, kristen@linux.intel.com, deneen.t.dock@intel.com, Nadav Amit , Rick Edgecombe Subject: [PATCH v4 09/23] x86/ftrace: Set trampoline pages as executable Date: Mon, 22 Apr 2019 11:57:51 -0700 Message-Id: <20190422185805.1169-10-rick.p.edgecombe@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190422185805.1169-1-rick.p.edgecombe@intel.com> References: <20190422185805.1169-1-rick.p.edgecombe@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nadav Amit Since alloc_module() will not set the pages as executable soon, set ftrace trampoline pages as executable after they are allocated. For the time being, do not change ftrace to use the text_poke() interface. As a result, ftrace still breaks W^X. Reviewed-by: Steven Rostedt (VMware) Signed-off-by: Nadav Amit Signed-off-by: Rick Edgecombe --- arch/x86/kernel/ftrace.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c index ef49517f6bb2..53ba1aa3a01f 100644 --- a/arch/x86/kernel/ftrace.c +++ b/arch/x86/kernel/ftrace.c @@ -730,6 +730,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) unsigned long end_offset; unsigned long op_offset; unsigned long offset; + unsigned long npages; unsigned long size; unsigned long retq; unsigned long *ptr; @@ -762,6 +763,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) return 0; *tramp_size = size + RET_SIZE + sizeof(void *); + npages = DIV_ROUND_UP(*tramp_size, PAGE_SIZE); /* Copy ftrace_caller onto the trampoline memory */ ret = probe_kernel_read(trampoline, (void *)start_offset, size); @@ -806,6 +808,12 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) /* ALLOC_TRAMP flags lets us know we created it */ ops->flags |= FTRACE_OPS_FL_ALLOC_TRAMP; + /* + * Module allocation needs to be completed by making the page + * executable. The page is still writable, which is a security hazard, + * but anyhow ftrace breaks W^X completely. + */ + set_memory_x((unsigned long)trampoline, npages); return (unsigned long)trampoline; fail: tramp_free(trampoline, *tramp_size); -- 2.17.1