Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp621800pxa; Wed, 12 Aug 2020 09:39:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzM3H8t8XNoUe6s9n3ZHY1pPlO+Ih/6NTKPnoRU42ff649KjaGY1vJ3Sxgvir1rEDfiD5/K X-Received: by 2002:a05:6402:1ac8:: with SMTP id ba8mr739240edb.316.1597250380729; Wed, 12 Aug 2020 09:39:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597250380; cv=none; d=google.com; s=arc-20160816; b=xgdkt5nH+ErZnb+KRaG4wuRvvui/b/oCbozbnUw+lopDrpROqi1UP6z+yMQlVlCzq8 n+G0xTEw2IXiczNvo1Lk85yMNIlQrOW5KQzvnWf2a7usHad28sXAcRYemTaPMI3vXX98 8Wb4+hCloNuTs8zFS8Ag3Jp03neNHf4ensfGUYUslH14YFoX7dn69xH4FnMfNdMVEJ2A IG2fit/kWnz7Blc4JJHAb87XMpFcjQV27ck51lkMCnm3bwVbYLGFCbPbetg6VI3jFtjD qcvLdHrFfQ1+8DiX7zpuxMurTwu5AvRqS0HTRISY74NPoC62daiT2XjWxCJBJP06htaw iAaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=TBQczz0pF65ee28mtS1nTJ5b2juE29AVQWMZql+NX20=; b=XEIEks33FDlTekI3yPrRCZ1GEKCySx6EfDuZalu+zeAbGFTPgAuO0NktoZkvZIZwAk g4aOWVYbJ9Jpf3Yn5KADqahhrt4weYIheJOj6u5VR+Iou9pHM6QoVdzc2Ki+fBE2IMnF nq5GwwhKrN88x28IllW3yZlxFwVLsfgJj5UPqV3XWjdMUZZ89Vhacbtr31t08v+ev7eQ cUo/Ad91FHpdprDWzLWsAVhjHZ147KYzR7gR1/ygKWkP+2H3mrCSZaH2OCSReOVknSNF BEGd2WbQUZHDFO+Svf1YrIJPLZ4ruXbpkDcdQKxsV6KgprGQ+a5DStdg0EKafzGcco6h zBoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yDsiPdhX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f3si1493077edc.268.2020.08.12.09.39.17; Wed, 12 Aug 2020 09:39:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yDsiPdhX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726660AbgHLQiL (ORCPT + 99 others); Wed, 12 Aug 2020 12:38:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:54076 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726394AbgHLQiK (ORCPT ); Wed, 12 Aug 2020 12:38:10 -0400 Received: from mail-oi1-f175.google.com (mail-oi1-f175.google.com [209.85.167.175]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0054F20829 for ; Wed, 12 Aug 2020 16:38:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597250290; bh=g+vnHchZeppKFqA16SZles9r2hkX9j6Ro9SabEXDaSo=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=yDsiPdhXR51C57hIBThVIOD081yGDqt8JQ53RBzTVKCA6B5WlES5WPWIJXkx4ef/x hCy5M4yfUTZJGshYklOe3k2j7UCOtIrkqJc+ipNT5ONm5k98JIBEVZWxVr8vbsj5B4 RkPuZuc8jWo7R88GNO92kiwzq6seFKm4cJR1FC3s= Received: by mail-oi1-f175.google.com with SMTP id l204so2386203oib.3 for ; Wed, 12 Aug 2020 09:38:09 -0700 (PDT) X-Gm-Message-State: AOAM532JLZLAorAf8YR+3NmQE6NkhkUopIOcKOjyfpB+5yjR3Ca08kgr VXQz3ymHYKklZyXVaVQFxUkNTrom+xBrC27680I= X-Received: by 2002:aca:d8c5:: with SMTP id p188mr7661847oig.47.1597250289159; Wed, 12 Aug 2020 09:38:09 -0700 (PDT) MIME-Version: 1.0 References: <20200810092523.GA8612@linux-8ccs> <20200810150647.GB8612@linux-8ccs> <20200811163427.6edbf343@coco.lan> <20200811145524.GE2674@hirez.programming.kicks-ass.net> <20200811172738.2d632a09@coco.lan> <20200811160134.GA13652@linux-8ccs> <20200812104005.GN2674@hirez.programming.kicks-ass.net> <20200812125645.GA8675@willie-the-truck> <20200812141557.GQ14398@arm.com> <20200812160017.GA30302@linux-8ccs> In-Reply-To: <20200812160017.GA30302@linux-8ccs> From: Ard Biesheuvel Date: Wed, 12 Aug 2020 18:37:57 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] module: Harden STRICT_MODULE_RWX To: Jessica Yu Cc: Szabolcs Nagy , Will Deacon , Peter Zijlstra , Mauro Carvalho Chehab , Linux Kernel Mailing List , Thomas Gleixner , Kees Cook , Josh Poimboeuf , Miroslav Benes , Mark Rutland , nd Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org module_frob_arch_sections On Wed, 12 Aug 2020 at 18:00, Jessica Yu wrote: > > +++ Szabolcs Nagy [12/08/20 15:15 +0100]: > >The 08/12/2020 13:56, Will Deacon wrote: > >> On Wed, Aug 12, 2020 at 12:40:05PM +0200, peterz@infradead.org wrote: > >> > On Wed, Aug 12, 2020 at 10:56:56AM +0200, Ard Biesheuvel wrote: > >> > > The module .lds has BYTE(0) in the section contents to prevent the > >> > > linker from pruning them entirely. The (NOLOAD) is there to ensure > >> > > that this byte does not end up in the .ko, which is more a matter of > >> > > principle than anything else, so we can happily drop that if it helps. > >> > > > >> > > However, this should only affect the PROGBITS vs NOBITS designation, > >> > > and so I am not sure whether it makes a difference. > >> > > > >> > > Depending on where the w^x check occurs, we might simply override the > >> > > permissions of these sections, and strip the writable permission if it > >> > > is set in the PLT handling init code, which manipulates the metadata > >> > > of all these 3 sections before the module space is vmalloc'ed. > >> > > >> > What's curious is that this seems the result of some recent binutils > >> > change. Every build with binutils-2.34 (or older) does not seem to > >> > generate these as WAX, but has the much more sensible WA. > >> > > >> > I suppose we can change the kernel check and 'allow' W^X for 0 sized > >> > sections, but I think we should still figure out why binutils-2.35 is > >> > now generating WAX sections all of a sudden, it might come bite us > >> > elsewhere. > >> > >> Agreed, I think it's important to figure out what's going on here before we > >> try to bodge around it. > >> > >> Adding Szabolcs, in case he has any ideas. > >> > >> To save him reading the whole thread, here's a summary: > >> > >> AArch64 kernel modules built with binutils 2.35 end up with a couple of > >> ELF sections marked as SHF_WRITE | SHF_ALLOC | SHF_EXECINSTR: > >> > >> [ 5] .plt PROGBITS 0000000000000388 01d000 000008 00 WAX 0 0 1 > >> [ 6] .init.plt NOBITS 0000000000000390 01d008 000008 00 WA 0 0 1 > >> [ 7] .text.ftrace_trampoline PROGBITS 0000000000000398 01d008 000008 00 WAX 0 0 1 > >> > >> This results in the module being rejected by our loader, because we don't > >> permit writable, executable mappings. > >> > >> Our linker script for these entries uses NOLOAD, so it's odd to see PROGBITS > >> appearing in the readelf output above (and older binutils emits NOBITS > >> sections). Anyway, here's the linker script: > >> > >> SECTIONS { > >> .plt (NOLOAD) : { BYTE(0) } > >> .init.plt (NOLOAD) : { BYTE(0) } > >> .text.ftrace_trampoline (NOLOAD) : { BYTE(0) } > >> } > >> > >> It appears that the name of the section influences the behaviour, as > >> Jessica observed [1] that sections named .text.* end up with PROGBITS, > >> whereas random naming such as ".test" ends up with NOBITS, as before. > >> > >> We've looked at the changelog between binutils 2.34 and 2.35, but nothing > >> stands out. Any clues? Is this intentional binutils behaviour? > > > >for me it bisects to > > > >https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=8c803a2dd7d3d742a3d0071914f557ef465afe71 > > > >i will have to investigate further what's going on. > > Thanks for the hint. I'm almost certain it's due to this excerpt from > the changelog: "we now init sh_type and sh_flags for all known ABI sections > in _bfd_elf_new_section_hook." > > Indeed, .plt and .text.* are listed as special sections in bfd/elf.c. > The former requires an exact match and the latter only has to match > the prefix ".text." Since the code considers ".plt" and > ".text.ftrace_trampoline" special sections, their sh_type and sh_flags > are now set by default. Now I guess the question is whether this can > be overriden by a linker script.. > If this is even possible to begin with, doing this in a way that is portable across the various linkers that we claim to support is going to be tricky. I suppose this is the downside of using partially linked objects as our module format - using ordinary shared libraries (along with the appropriate dynamic relocations which are mostly portable across architectures) would get rid of most of the PLT and trampoline issues, and of a lot of complex static relocation processing code. I know there is little we can do at this point, apart from ignoring the permissions - perhaps we should just defer the w^x check until after calling module_frob_arch_sections()?