Skip to content

Commit

Permalink
module: prepare to handle ROX allocations for text
Browse files Browse the repository at this point in the history
In order to support ROX allocations for module text, it is necessary to
handle modifications to the code, such as relocations and alternatives
patching, without write access to that memory.

One option is to use text patching, but this would make module loading
extremely slow and will expose executable code that is not finally formed.

A better way is to have memory allocated with ROX permissions contain
invalid instructions and keep a writable, but not executable copy of the
module text.  The relocations and alternative patches would be done on the
writable copy using the addresses of the ROX memory.  Once the module is
completely ready, the updated text will be copied to ROX memory using text
patching in one go and the writable copy will be freed.

Add support for that to module initialization code and provide necessary
interfaces in execmem.

Link: https://lkml.kernel.org/r/[email protected]
Signed-off-by: Mike Rapoport (Microsoft) <[email protected]>
Reviewd-by: Luis Chamberlain <[email protected]>
Tested-by: kdevops <[email protected]>
Cc: Andreas Larsson <[email protected]>
Cc: Andy Lutomirski <[email protected]>
Cc: Ard Biesheuvel <[email protected]>
Cc: Arnd Bergmann <[email protected]>
Cc: Borislav Petkov (AMD) <[email protected]>
Cc: Brian Cain <[email protected]>
Cc: Catalin Marinas <[email protected]>
Cc: Christophe Leroy <[email protected]>
Cc: Christoph Hellwig <[email protected]>
Cc: Dave Hansen <[email protected]>
Cc: Dinh Nguyen <[email protected]>
Cc: Geert Uytterhoeven <[email protected]>
Cc: Guo Ren <[email protected]>
Cc: Helge Deller <[email protected]>
Cc: Huacai Chen <[email protected]>
Cc: Ingo Molnar <[email protected]>
Cc: Johannes Berg <[email protected]>
Cc: John Paul Adrian Glaubitz <[email protected]>
Cc: Kent Overstreet <[email protected]>
Cc: Liam R. Howlett <[email protected]>
Cc: Mark Rutland <[email protected]>
Cc: Masami Hiramatsu (Google) <[email protected]>
Cc: Matt Turner <[email protected]>
Cc: Max Filippov <[email protected]>
Cc: Michael Ellerman <[email protected]>
Cc: Michal Simek <[email protected]>
Cc: Oleg Nesterov <[email protected]>
Cc: Palmer Dabbelt <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Richard Weinberger <[email protected]>
Cc: Russell King <[email protected]>
Cc: Song Liu <[email protected]>
Cc: Stafford Horne <[email protected]>
Cc: Steven Rostedt (Google) <[email protected]>
Cc: Suren Baghdasaryan <[email protected]>
Cc: Thomas Bogendoerfer <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: Uladzislau Rezki (Sony) <[email protected]>
Cc: Vineet Gupta <[email protected]>
Cc: Will Deacon <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
  • Loading branch information
rppt authored and akpm00 committed Nov 7, 2024
1 parent 0c3beac commit 0c133b1
Show file tree
Hide file tree
Showing 7 changed files with 126 additions and 8 deletions.
23 changes: 23 additions & 0 deletions include/linux/execmem.h
Original file line number Diff line number Diff line change
Expand Up @@ -46,9 +46,11 @@ enum execmem_type {
/**
* enum execmem_range_flags - options for executable memory allocations
* @EXECMEM_KASAN_SHADOW: allocate kasan shadow
* @EXECMEM_ROX_CACHE: allocations should use ROX cache of huge pages
*/
enum execmem_range_flags {
EXECMEM_KASAN_SHADOW = (1 << 0),
EXECMEM_ROX_CACHE = (1 << 1),
};

/**
Expand Down Expand Up @@ -123,6 +125,27 @@ void *execmem_alloc(enum execmem_type type, size_t size);
*/
void execmem_free(void *ptr);

/**
* execmem_update_copy - copy an update to executable memory
* @dst: destination address to update
* @src: source address containing the data
* @size: how many bytes of memory shold be copied
*
* Copy @size bytes from @src to @dst using text poking if the memory at
* @dst is read-only.
*
* Return: a pointer to @dst or NULL on error
*/
void *execmem_update_copy(void *dst, const void *src, size_t size);

/**
* execmem_is_rox - check if execmem is read-only
* @type - the execmem type to check
*
* Return: %true if the @type is read-only, %false if it's writable
*/
bool execmem_is_rox(enum execmem_type type);

#if defined(CONFIG_EXECMEM) && !defined(CONFIG_ARCH_WANTS_EXECMEM_LATE)
void execmem_init(void);
#else
Expand Down
16 changes: 16 additions & 0 deletions include/linux/module.h
Original file line number Diff line number Diff line change
Expand Up @@ -367,6 +367,8 @@ enum mod_mem_type {

struct module_memory {
void *base;
void *rw_copy;
bool is_rox;
unsigned int size;

#ifdef CONFIG_MODULES_TREE_LOOKUP
Expand Down Expand Up @@ -767,6 +769,15 @@ static inline bool is_livepatch_module(struct module *mod)

void set_module_sig_enforced(void);

void *__module_writable_address(struct module *mod, void *loc);

static inline void *module_writable_address(struct module *mod, void *loc)
{
if (!IS_ENABLED(CONFIG_ARCH_HAS_EXECMEM_ROX) || !mod)
return loc;
return __module_writable_address(mod, loc);
}

#else /* !CONFIG_MODULES... */

static inline struct module *__module_address(unsigned long addr)
Expand Down Expand Up @@ -874,6 +885,11 @@ static inline bool module_is_coming(struct module *mod)
{
return false;
}

static inline void *module_writable_address(struct module *mod, void *loc)
{
return loc;
}
#endif /* CONFIG_MODULES */

#ifdef CONFIG_SYSFS
Expand Down
4 changes: 4 additions & 0 deletions include/linux/moduleloader.h
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,10 @@ int module_finalize(const Elf_Ehdr *hdr,
const Elf_Shdr *sechdrs,
struct module *mod);

int module_post_finalize(const Elf_Ehdr *hdr,
const Elf_Shdr *sechdrs,
struct module *mod);

#ifdef CONFIG_MODULES
void flush_module_init_free_work(void);
#else
Expand Down
3 changes: 2 additions & 1 deletion kernel/module/debug_kmemleak.c
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,8 @@ void kmemleak_load_module(const struct module *mod,
{
/* only scan writable, non-executable sections */
for_each_mod_mem_type(type) {
if (type != MOD_DATA && type != MOD_INIT_DATA)
if (type != MOD_DATA && type != MOD_INIT_DATA &&
!mod->mem[type].is_rox)
kmemleak_no_scan(mod->mem[type].base);
}
}
74 changes: 67 additions & 7 deletions kernel/module/main.c
Original file line number Diff line number Diff line change
Expand Up @@ -1189,6 +1189,18 @@ void __weak module_arch_freeing_init(struct module *mod)
{
}

void *__module_writable_address(struct module *mod, void *loc)
{
for_class_mod_mem_type(type, text) {
struct module_memory *mem = &mod->mem[type];

if (loc >= mem->base && loc < mem->base + mem->size)
return loc + (mem->rw_copy - mem->base);
}

return loc;
}

static int module_memory_alloc(struct module *mod, enum mod_mem_type type)
{
unsigned int size = PAGE_ALIGN(mod->mem[type].size);
Expand All @@ -1206,6 +1218,23 @@ static int module_memory_alloc(struct module *mod, enum mod_mem_type type)
if (!ptr)
return -ENOMEM;

mod->mem[type].base = ptr;

if (execmem_is_rox(execmem_type)) {
ptr = vzalloc(size);

if (!ptr) {
execmem_free(mod->mem[type].base);
return -ENOMEM;
}

mod->mem[type].rw_copy = ptr;
mod->mem[type].is_rox = true;
} else {
mod->mem[type].rw_copy = mod->mem[type].base;
memset(mod->mem[type].base, 0, size);
}

/*
* The pointer to these blocks of memory are stored on the module
* structure and we keep that around so long as the module is
Expand All @@ -1219,16 +1248,17 @@ static int module_memory_alloc(struct module *mod, enum mod_mem_type type)
*/
kmemleak_not_leak(ptr);

memset(ptr, 0, size);
mod->mem[type].base = ptr;

return 0;
}

static void module_memory_free(struct module *mod, enum mod_mem_type type,
bool unload_codetags)
{
void *ptr = mod->mem[type].base;
struct module_memory *mem = &mod->mem[type];
void *ptr = mem->base;

if (mem->is_rox)
vfree(mem->rw_copy);

if (!unload_codetags && mod_mem_type_is_core_data(type))
return;
Expand Down Expand Up @@ -2251,6 +2281,7 @@ static int move_module(struct module *mod, struct load_info *info)
for_each_mod_mem_type(type) {
if (!mod->mem[type].size) {
mod->mem[type].base = NULL;
mod->mem[type].rw_copy = NULL;
continue;
}

Expand All @@ -2267,11 +2298,14 @@ static int move_module(struct module *mod, struct load_info *info)
void *dest;
Elf_Shdr *shdr = &info->sechdrs[i];
enum mod_mem_type type = shdr->sh_entsize >> SH_ENTSIZE_TYPE_SHIFT;
unsigned long offset = shdr->sh_entsize & SH_ENTSIZE_OFFSET_MASK;
unsigned long addr;

if (!(shdr->sh_flags & SHF_ALLOC))
continue;

dest = mod->mem[type].base + (shdr->sh_entsize & SH_ENTSIZE_OFFSET_MASK);
addr = (unsigned long)mod->mem[type].base + offset;
dest = mod->mem[type].rw_copy + offset;

if (shdr->sh_type != SHT_NOBITS) {
/*
Expand All @@ -2293,7 +2327,7 @@ static int move_module(struct module *mod, struct load_info *info)
* users of info can keep taking advantage and using the newly
* minted official memory area.
*/
shdr->sh_addr = (unsigned long)dest;
shdr->sh_addr = addr;
pr_debug("\t0x%lx 0x%.8lx %s\n", (long)shdr->sh_addr,
(long)shdr->sh_size, info->secstrings + shdr->sh_name);
}
Expand Down Expand Up @@ -2441,8 +2475,17 @@ int __weak module_finalize(const Elf_Ehdr *hdr,
return 0;
}

int __weak module_post_finalize(const Elf_Ehdr *hdr,
const Elf_Shdr *sechdrs,
struct module *me)
{
return 0;
}

static int post_relocation(struct module *mod, const struct load_info *info)
{
int ret;

/* Sort exception table now relocations are done. */
sort_extable(mod->extable, mod->extable + mod->num_exentries);

Expand All @@ -2454,7 +2497,24 @@ static int post_relocation(struct module *mod, const struct load_info *info)
add_kallsyms(mod, info);

/* Arch-specific module finalizing. */
return module_finalize(info->hdr, info->sechdrs, mod);
ret = module_finalize(info->hdr, info->sechdrs, mod);
if (ret)
return ret;

for_each_mod_mem_type(type) {
struct module_memory *mem = &mod->mem[type];

if (mem->is_rox) {
if (!execmem_update_copy(mem->base, mem->rw_copy,
mem->size))
return -ENOMEM;

vfree(mem->rw_copy);
mem->rw_copy = NULL;
}
}

return module_post_finalize(info->hdr, info->sechdrs, mod);
}

/* Call module constructors. */
Expand Down
3 changes: 3 additions & 0 deletions kernel/module/strict_rwx.c
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,9 @@ int module_enable_text_rox(const struct module *mod)
for_class_mod_mem_type(type, text) {
int ret;

if (mod->mem[type].is_rox)
continue;

if (IS_ENABLED(CONFIG_STRICT_MODULE_RWX))
ret = module_set_memory(mod, type, set_memory_rox);
else
Expand Down
11 changes: 11 additions & 0 deletions mm/execmem.c
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@
#include <linux/vmalloc.h>
#include <linux/execmem.h>
#include <linux/moduleloader.h>
#include <linux/text-patching.h>

static struct execmem_info *execmem_info __ro_after_init;
static struct execmem_info default_execmem_info __ro_after_init;
Expand Down Expand Up @@ -69,6 +70,16 @@ void execmem_free(void *ptr)
vfree(ptr);
}

void *execmem_update_copy(void *dst, const void *src, size_t size)
{
return text_poke_copy(dst, src, size);
}

bool execmem_is_rox(enum execmem_type type)
{
return !!(execmem_info->ranges[type].flags & EXECMEM_ROX_CACHE);
}

static bool execmem_validate(struct execmem_info *info)
{
struct execmem_range *r = &info->ranges[EXECMEM_DEFAULT];
Expand Down

0 comments on commit 0c133b1

Please sign in to comment.