// SPDX-License-Identifier: GPL-2.0-or-later /* * Module strict rwx * * Copyright (C) 2015 Rusty Russell */ #include #include #include #include #include "internal.h" /* * LKM RO/NX protection: protect module's text/ro-data * from modification and any data from execution. * * General layout of module is: * [text] [read-only-data] [ro-after-init] [writable data] * text_size -----^ ^ ^ ^ * ro_size ------------------------| | | * ro_after_init_size -----------------------------| | * size -----------------------------------------------------------| * * These values are always page-aligned (as is base) when * CONFIG_STRICT_MODULE_RWX is set. */ /* * Since some arches are moving towards PAGE_KERNEL module allocations instead * of PAGE_KERNEL_EXEC, keep frob_text() and module_enable_x() independent of * CONFIG_STRICT_MODULE_RWX because they are needed regardless of whether we * are strict. */ static void frob_text(const struct module_layout *layout, int (*set_memory)(unsigned long start, int num_pages)) { set_memory((unsigned long)layout->base, PAGE_ALIGN(layout->text_size) >> PAGE_SHIFT); } static void frob_rodata(const struct module_layout *layout, int (*set_memory)(unsigned long start, int num_pages)) { set_memory((unsigned long)layout->base + layout->text_size, (layout->ro_size - layout->text_size) >> PAGE_SHIFT); } static void frob_ro_after_init(const struct module_layout *layout, int (*set_memory)(unsigned long start, int num_pages)) { set_memory((unsigned long)layout->base + layout->ro_size, (layout->ro_after_init_size - layout->ro_size) >> PAGE_SHIFT); } static void frob_writable_data(const struct module_layout *layout, int (*set_memory)(unsigned long start, int num_pages)) { set_memory((unsigned long)layout->base + layout->ro_after_init_size, (layout->size - layout->ro_after_init_size) >> PAGE_SHIFT); } static bool layout_check_misalignment(const struct module_layout *layout) { return WARN_ON(!PAGE_ALIGNED(layout->base)) || WARN_ON(!PAGE_ALIGNED(layout->text_size)) || WARN_ON(!PAGE_ALIGNED(layout->ro_size)) || WARN_ON(!PAGE_ALIGNED(layout->ro_after_init_size)) || WARN_ON(!PAGE_ALIGNED(layout->size)); } bool module_check_misalignment(const struct module *mod) { if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX)) return false; return layout_check_misalignment(&mod->core_layout) || layout_check_misalignment(&mod->data_layout) || layout_check_misalignment(&mod->init_layout); } void module_enable_x(const struct module *mod) { if (!PAGE_ALIGNED(mod->core_layout.base) || !PAGE_ALIGNED(mod->init_layout.base)) return; frob_text(&mod->core_layout, set_memory_x); frob_text(&mod->init_layout, set_memory_x); } void module_enable_ro(const struct module *mod, bool after_init) { if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX)) return; #ifdef CONFIG_STRICT_MODULE_RWX if (!rodata_enabled) return; #endif set_vm_flush_reset_perms(mod->core_layout.base); set_vm_flush_reset_perms(mod->init_layout.base); frob_text(&mod->core_layout, set_memory_ro); frob_rodata(&mod->data_layout, set_memory_ro); frob_text(&mod->init_layout, set_memory_ro); frob_rodata(&mod->init_layout, set_memory_ro); if (after_init) frob_ro_after_init(&mod->data_layout, set_memory_ro); } void module_enable_nx(const struct module *mod) { if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX)) return; frob_rodata(&mod->data_layout, set_memory_nx); frob_ro_after_init(&mod->data_layout, set_memory_nx); frob_writable_data(&mod->data_layout, set_memory_nx); frob_rodata(&mod->init_layout, set_memory_nx); frob_writable_data(&mod->init_layout, set_memory_nx); } int module_enforce_rwx_sections(Elf_Ehdr *hdr, Elf_Shdr *sechdrs, char *secstrings, struct module *mod) { const unsigned long shf_wx = SHF_WRITE | SHF_EXECINSTR; int i; if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX)) return 0; for (i = 0; i < hdr->e_shnum; i++) { if ((sechdrs[i].sh_flags & shf_wx) == shf_wx) { pr_err("%s: section %s (index %d) has invalid WRITE|EXEC flags\n", mod->name, secstrings + sechdrs[i].sh_name, i); return -ENOEXEC; } } return 0; }