1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * Copyright (C) 2015 Rusty Russell
8 #include <linux/module.h>
10 #include <linux/vmalloc.h>
11 #include <linux/set_memory.h>
15 * LKM RO/NX protection: protect module's text/ro-data
16 * from modification and any data from execution.
18 * General layout of module is:
19 * [text] [read-only-data] [ro-after-init] [writable data]
20 * text_size -----^ ^ ^ ^
21 * ro_size ------------------------| | |
22 * ro_after_init_size -----------------------------| |
23 * size -----------------------------------------------------------|
25 * These values are always page-aligned (as is base) when
26 * CONFIG_STRICT_MODULE_RWX is set.
30 * Since some arches are moving towards PAGE_KERNEL module allocations instead
31 * of PAGE_KERNEL_EXEC, keep frob_text() and module_enable_x() independent of
32 * CONFIG_STRICT_MODULE_RWX because they are needed regardless of whether we
35 static void frob_text(const struct module_layout *layout,
36 int (*set_memory)(unsigned long start, int num_pages))
38 set_memory((unsigned long)layout->base,
39 PAGE_ALIGN(layout->text_size) >> PAGE_SHIFT);
42 static void frob_rodata(const struct module_layout *layout,
43 int (*set_memory)(unsigned long start, int num_pages))
45 set_memory((unsigned long)layout->base + layout->text_size,
46 (layout->ro_size - layout->text_size) >> PAGE_SHIFT);
49 static void frob_ro_after_init(const struct module_layout *layout,
50 int (*set_memory)(unsigned long start, int num_pages))
52 set_memory((unsigned long)layout->base + layout->ro_size,
53 (layout->ro_after_init_size - layout->ro_size) >> PAGE_SHIFT);
56 static void frob_writable_data(const struct module_layout *layout,
57 int (*set_memory)(unsigned long start, int num_pages))
59 set_memory((unsigned long)layout->base + layout->ro_after_init_size,
60 (layout->size - layout->ro_after_init_size) >> PAGE_SHIFT);
63 static bool layout_check_misalignment(const struct module_layout *layout)
65 return WARN_ON(!PAGE_ALIGNED(layout->base)) ||
66 WARN_ON(!PAGE_ALIGNED(layout->text_size)) ||
67 WARN_ON(!PAGE_ALIGNED(layout->ro_size)) ||
68 WARN_ON(!PAGE_ALIGNED(layout->ro_after_init_size)) ||
69 WARN_ON(!PAGE_ALIGNED(layout->size));
72 bool module_check_misalignment(const struct module *mod)
74 if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX))
77 return layout_check_misalignment(&mod->core_layout) ||
78 layout_check_misalignment(&mod->data_layout) ||
79 layout_check_misalignment(&mod->init_layout);
82 void module_enable_x(const struct module *mod)
84 if (!PAGE_ALIGNED(mod->core_layout.base) ||
85 !PAGE_ALIGNED(mod->init_layout.base))
88 frob_text(&mod->core_layout, set_memory_x);
89 frob_text(&mod->init_layout, set_memory_x);
92 void module_enable_ro(const struct module *mod, bool after_init)
94 if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX))
96 #ifdef CONFIG_STRICT_MODULE_RWX
101 set_vm_flush_reset_perms(mod->core_layout.base);
102 set_vm_flush_reset_perms(mod->init_layout.base);
103 frob_text(&mod->core_layout, set_memory_ro);
105 frob_rodata(&mod->data_layout, set_memory_ro);
106 frob_text(&mod->init_layout, set_memory_ro);
107 frob_rodata(&mod->init_layout, set_memory_ro);
110 frob_ro_after_init(&mod->data_layout, set_memory_ro);
113 void module_enable_nx(const struct module *mod)
115 if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX))
118 frob_rodata(&mod->data_layout, set_memory_nx);
119 frob_ro_after_init(&mod->data_layout, set_memory_nx);
120 frob_writable_data(&mod->data_layout, set_memory_nx);
121 frob_rodata(&mod->init_layout, set_memory_nx);
122 frob_writable_data(&mod->init_layout, set_memory_nx);
125 int module_enforce_rwx_sections(Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
126 char *secstrings, struct module *mod)
128 const unsigned long shf_wx = SHF_WRITE | SHF_EXECINSTR;
131 if (!IS_ENABLED(CONFIG_STRICT_MODULE_RWX))
134 for (i = 0; i < hdr->e_shnum; i++) {
135 if ((sechdrs[i].sh_flags & shf_wx) == shf_wx) {
136 pr_err("%s: section %s (index %d) has invalid WRITE|EXEC flags\n",
137 mod->name, secstrings + sechdrs[i].sh_name, i);