All of lore.kernel.org
 help / color / mirror / Atom feed
From: Sami Tolvanen <samitolvanen@google.com>
To: Kees Cook <keescook@chromium.org>
Cc: Nathan Chancellor <nathan@kernel.org>,
	Nick Desaulniers <ndesaulniers@google.com>,
	Masahiro Yamada <masahiroy@kernel.org>,
	Will Deacon <will@kernel.org>, Jessica Yu <jeyu@kernel.org>,
	Arnd Bergmann <arnd@arndb.de>, Tejun Heo <tj@kernel.org>,
	"Paul E. McKenney" <paulmck@kernel.org>,
	Christoph Hellwig <hch@infradead.org>,
	Peter Zijlstra <peterz@infradead.org>,
	Sedat Dilek <sedat.dilek@gmail.com>,
	bpf@vger.kernel.org, linux-hardening@vger.kernel.org,
	linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org,
	linux-kbuild@vger.kernel.org, linux-pci@vger.kernel.org,
	linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com,
	Sami Tolvanen <samitolvanen@google.com>
Subject: [PATCH v4 04/17] module: ensure __cfi_check alignment
Date: Wed, 31 Mar 2021 14:27:08 -0700	[thread overview]
Message-ID: <20210331212722.2746212-5-samitolvanen@google.com> (raw)
In-Reply-To: <20210331212722.2746212-1-samitolvanen@google.com>

CONFIG_CFI_CLANG_SHADOW assumes the __cfi_check() function is page
aligned and at the beginning of the .text section. While Clang would
normally align the function correctly, it fails to do so for modules
with no executable code.

This change ensures the correct __cfi_check() location and
alignment. It also discards the .eh_frame section, which Clang can
generate with certain sanitizers, such as CFI.

Link: https://bugs.llvm.org/show_bug.cgi?id=46293
Signed-off-by: Sami Tolvanen <samitolvanen@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Acked-by: Jessica Yu <jeyu@kernel.org>
---
 scripts/module.lds.S | 20 +++++++++++++++++++-
 1 file changed, 19 insertions(+), 1 deletion(-)

diff --git a/scripts/module.lds.S b/scripts/module.lds.S
index 168cd27e6122..2ba9e5ce71df 100644
--- a/scripts/module.lds.S
+++ b/scripts/module.lds.S
@@ -3,10 +3,21 @@
  * Archs are free to supply their own linker scripts.  ld will
  * combine them automatically.
  */
+#include <asm/page.h>
+
+#ifdef CONFIG_CFI_CLANG
+# define ALIGN_CFI 		ALIGN(PAGE_SIZE)
+# define SANITIZER_DISCARDS	*(.eh_frame)
+#else
+# define ALIGN_CFI
+# define SANITIZER_DISCARDS
+#endif
+
 SECTIONS {
 	/DISCARD/ : {
 		*(.discard)
 		*(.discard.*)
+		SANITIZER_DISCARDS
 	}
 
 	__ksymtab		0 : { *(SORT(___ksymtab+*)) }
@@ -40,7 +51,14 @@ SECTIONS {
 		*(.rodata..L*)
 	}
 
-	.text : { *(.text .text.[0-9a-zA-Z_]*) }
+	/*
+	 * With CONFIG_CFI_CLANG, we assume __cfi_check is at the beginning
+	 * of the .text section, and is aligned to PAGE_SIZE.
+	 */
+	.text : ALIGN_CFI {
+		*(.text.__cfi_check)
+		*(.text .text.[0-9a-zA-Z_]* .text..L.cfi*)
+	}
 }
 
 /* bring in arch-specific sections */
-- 
2.31.0.291.g576ba9dcdaf-goog


WARNING: multiple messages have this Message-ID (diff)
From: Sami Tolvanen <samitolvanen@google.com>
To: Kees Cook <keescook@chromium.org>
Cc: Nathan Chancellor <nathan@kernel.org>,
	Nick Desaulniers <ndesaulniers@google.com>,
	 Masahiro Yamada <masahiroy@kernel.org>,
	Will Deacon <will@kernel.org>, Jessica Yu <jeyu@kernel.org>,
	 Arnd Bergmann <arnd@arndb.de>, Tejun Heo <tj@kernel.org>,
	"Paul E. McKenney" <paulmck@kernel.org>,
	 Christoph Hellwig <hch@infradead.org>,
	Peter Zijlstra <peterz@infradead.org>,
	 Sedat Dilek <sedat.dilek@gmail.com>,
	bpf@vger.kernel.org,  linux-hardening@vger.kernel.org,
	linux-arch@vger.kernel.org,
	 linux-arm-kernel@lists.infradead.org,
	linux-kbuild@vger.kernel.org,  linux-pci@vger.kernel.org,
	linux-kernel@vger.kernel.org,
	 clang-built-linux@googlegroups.com,
	Sami Tolvanen <samitolvanen@google.com>
Subject: [PATCH v4 04/17] module: ensure __cfi_check alignment
Date: Wed, 31 Mar 2021 14:27:08 -0700	[thread overview]
Message-ID: <20210331212722.2746212-5-samitolvanen@google.com> (raw)
In-Reply-To: <20210331212722.2746212-1-samitolvanen@google.com>

CONFIG_CFI_CLANG_SHADOW assumes the __cfi_check() function is page
aligned and at the beginning of the .text section. While Clang would
normally align the function correctly, it fails to do so for modules
with no executable code.

This change ensures the correct __cfi_check() location and
alignment. It also discards the .eh_frame section, which Clang can
generate with certain sanitizers, such as CFI.

Link: https://bugs.llvm.org/show_bug.cgi?id=46293
Signed-off-by: Sami Tolvanen <samitolvanen@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Acked-by: Jessica Yu <jeyu@kernel.org>
---
 scripts/module.lds.S | 20 +++++++++++++++++++-
 1 file changed, 19 insertions(+), 1 deletion(-)

diff --git a/scripts/module.lds.S b/scripts/module.lds.S
index 168cd27e6122..2ba9e5ce71df 100644
--- a/scripts/module.lds.S
+++ b/scripts/module.lds.S
@@ -3,10 +3,21 @@
  * Archs are free to supply their own linker scripts.  ld will
  * combine them automatically.
  */
+#include <asm/page.h>
+
+#ifdef CONFIG_CFI_CLANG
+# define ALIGN_CFI 		ALIGN(PAGE_SIZE)
+# define SANITIZER_DISCARDS	*(.eh_frame)
+#else
+# define ALIGN_CFI
+# define SANITIZER_DISCARDS
+#endif
+
 SECTIONS {
 	/DISCARD/ : {
 		*(.discard)
 		*(.discard.*)
+		SANITIZER_DISCARDS
 	}
 
 	__ksymtab		0 : { *(SORT(___ksymtab+*)) }
@@ -40,7 +51,14 @@ SECTIONS {
 		*(.rodata..L*)
 	}
 
-	.text : { *(.text .text.[0-9a-zA-Z_]*) }
+	/*
+	 * With CONFIG_CFI_CLANG, we assume __cfi_check is at the beginning
+	 * of the .text section, and is aligned to PAGE_SIZE.
+	 */
+	.text : ALIGN_CFI {
+		*(.text.__cfi_check)
+		*(.text .text.[0-9a-zA-Z_]* .text..L.cfi*)
+	}
 }
 
 /* bring in arch-specific sections */
-- 
2.31.0.291.g576ba9dcdaf-goog


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2021-03-31 21:28 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-03-31 21:27 [PATCH v4 00/17] Add support for Clang CFI Sami Tolvanen
2021-03-31 21:27 ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 01/17] add " Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 02/17] cfi: add __cficanonical Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 03/17] mm: add generic function_nocfi macro Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` Sami Tolvanen [this message]
2021-03-31 21:27   ` [PATCH v4 04/17] module: ensure __cfi_check alignment Sami Tolvanen
2021-04-01  1:31   ` kernel test robot
2021-04-01 16:24     ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 05/17] workqueue: use WARN_ON_FUNCTION_MISMATCH Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 06/17] kthread: " Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 07/17] kallsyms: strip ThinLTO hashes from static functions Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 08/17] bpf: disable CFI in dispatcher functions Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 09/17] treewide: Change list_sort to use const pointers Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 10/17] lkdtm: use function_nocfi Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 11/17] psci: use function_nocfi for cpu_resume Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 12/17] arm64: implement function_nocfi Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 13/17] arm64: use function_nocfi with __pa_symbol Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 14/17] arm64: add __nocfi to functions that jump to a physical address Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 15/17] arm64: add __nocfi to __apply_alternatives Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 16/17] KVM: arm64: Disable CFI for nVHE Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:27 ` [PATCH v4 17/17] arm64: allow CONFIG_CFI_CLANG to be selected Sami Tolvanen
2021-03-31 21:27   ` Sami Tolvanen
2021-03-31 21:46 ` [PATCH v4 00/17] Add support for Clang CFI Kees Cook
2021-03-31 21:46   ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210331212722.2746212-5-samitolvanen@google.com \
    --to=samitolvanen@google.com \
    --cc=arnd@arndb.de \
    --cc=bpf@vger.kernel.org \
    --cc=clang-built-linux@googlegroups.com \
    --cc=hch@infradead.org \
    --cc=jeyu@kernel.org \
    --cc=keescook@chromium.org \
    --cc=linux-arch@vger.kernel.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-hardening@vger.kernel.org \
    --cc=linux-kbuild@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-pci@vger.kernel.org \
    --cc=masahiroy@kernel.org \
    --cc=nathan@kernel.org \
    --cc=ndesaulniers@google.com \
    --cc=paulmck@kernel.org \
    --cc=peterz@infradead.org \
    --cc=sedat.dilek@gmail.com \
    --cc=tj@kernel.org \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.