Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp339108yba; Fri, 26 Apr 2019 00:34:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqxMB1wzxLkc4YRw5Wl8rJVhcFK632BmqAa9jWaAgVKXDLxlw8r7C7d2NoyaUQkugpoctEsL X-Received: by 2002:a65:610a:: with SMTP id z10mr43384476pgu.23.1556264072449; Fri, 26 Apr 2019 00:34:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556264072; cv=none; d=google.com; s=arc-20160816; b=a0lR59HQqCpcrNfflA5KQvlNxAeSv16ap+psScbacqUXmGbJ4hm6dozY952ONV+j8E /2ti34+7ZL8kaAGAHUqt0frNTTjsRk307N2ZTGOOk/s2YW0Y+6pUcGaRA7nzZg1YsctT w2//qUTiw+WpMjl6ugQIEjK3lIVvmKlLLmo6jaeZC+s/LY3NAaQgFg2VSfcqeJPvREqq DdWygxtNuxJetEEGpULjoLMH1w17SCIiHyLabnermxp9hzeZKDzaCY6w7aQ8Nv1YSx1H /WnYQ0JYzK8dmFChrRjbz/0s/k3rZzE9lUsF0t6we87t9E5wFj88WK7H/dWCYFbL3MDQ 3XVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=/dQyv1Uey2RUfadDTtULdd0YvB0m8yojiZj6sZU6y84=; b=Hu5OiCEF8N6chOn6i8f14KrN25YTvTWT9lzlzWu7WrKoNZi/Zke2TcvB1RIGqxH3qH Pd56MXkitHPq/7N66kRpquUCm7r8p6azfRTZET4xhYd3BCgCUxB32BGkRDxB0XSPa0Wx QlzsnE224OAS/Ck1h/lZzqvq1CZEAJ8FyqN9tQYeOZp/sONYdPw766j0Koj2+zBVhPTw Fwrnyt6hGArds57eJWemHFLehhi3a39Udcp6RgKlddCjNaSGyB6HYJJmYO6q28GzJajb o4dbCClUxQ9ppNoL3/YLmxgGAy8fvSiW8j93wNYmiG+GZfbeBYWWaQOgtv2JMhHYsrw5 GMQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q3si22701772pgp.40.2019.04.26.00.34.17; Fri, 26 Apr 2019 00:34:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726700AbfDZHc7 (ORCPT + 99 others); Fri, 26 Apr 2019 03:32:59 -0400 Received: from ex13-edg-ou-002.vmware.com ([208.91.0.190]:29121 "EHLO EX13-EDG-OU-002.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726316AbfDZHb7 (ORCPT ); Fri, 26 Apr 2019 03:31:59 -0400 Received: from sc9-mailhost3.vmware.com (10.113.161.73) by EX13-EDG-OU-002.vmware.com (10.113.208.156) with Microsoft SMTP Server id 15.0.1156.6; Fri, 26 Apr 2019 00:31:44 -0700 Received: from sc2-haas01-esx0118.eng.vmware.com (sc2-haas01-esx0118.eng.vmware.com [10.172.44.118]) by sc9-mailhost3.vmware.com (Postfix) with ESMTP id AA61841299; Fri, 26 Apr 2019 00:31:45 -0700 (PDT) From: Nadav Amit To: Peter Zijlstra , Borislav Petkov , Andy Lutomirski , Ingo Molnar CC: , , , Thomas Gleixner , Nadav Amit , Dave Hansen , , , , , , , , , , , Rick Edgecombe , Nadav Amit Subject: [PATCH v5 09/23] x86/ftrace: Set trampoline pages as executable Date: Thu, 25 Apr 2019 17:11:29 -0700 Message-ID: <20190426001143.4983-10-namit@vmware.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190426001143.4983-1-namit@vmware.com> References: <20190426001143.4983-1-namit@vmware.com> MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-002.vmware.com: namit@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since alloc_module() will not set the pages as executable soon, set ftrace trampoline pages as executable after they are allocated. For the time being, do not change ftrace to use the text_poke() interface. As a result, ftrace still breaks W^X. Reviewed-by: Steven Rostedt (VMware) Signed-off-by: Nadav Amit Signed-off-by: Rick Edgecombe --- arch/x86/kernel/ftrace.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c index ef49517f6bb2..53ba1aa3a01f 100644 --- a/arch/x86/kernel/ftrace.c +++ b/arch/x86/kernel/ftrace.c @@ -730,6 +730,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) unsigned long end_offset; unsigned long op_offset; unsigned long offset; + unsigned long npages; unsigned long size; unsigned long retq; unsigned long *ptr; @@ -762,6 +763,7 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) return 0; *tramp_size = size + RET_SIZE + sizeof(void *); + npages = DIV_ROUND_UP(*tramp_size, PAGE_SIZE); /* Copy ftrace_caller onto the trampoline memory */ ret = probe_kernel_read(trampoline, (void *)start_offset, size); @@ -806,6 +808,12 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) /* ALLOC_TRAMP flags lets us know we created it */ ops->flags |= FTRACE_OPS_FL_ALLOC_TRAMP; + /* + * Module allocation needs to be completed by making the page + * executable. The page is still writable, which is a security hazard, + * but anyhow ftrace breaks W^X completely. + */ + set_memory_x((unsigned long)trampoline, npages); return (unsigned long)trampoline; fail: tramp_free(trampoline, *tramp_size); -- 2.17.1