mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-09-18 22:14:16 +00:00
Modules changes for 6.16-rc1
- Make .static_call_sites in modules read-only after init The .static_call_sites sections in modules have been made read-only after init to avoid any (non-)accidental modifications, similarly to how they are read-only after init in vmlinux. - The rest are minor cleanups. The changes have been on linux-next for 2 months, with the exception of the last comment-only cleanup. As discussed previously, we rotate module maintainership among its co-maintainers every 6 months. Daniel Gomez is next in line and he will send the next pull request for the modules. -----BEGIN PGP SIGNATURE----- iQFIBAABCAAyFiEEIduBR9MnFA82q/jtumpXJwqY6poFAmg9tSoUHHBldHIucGF2 bHVAc3VzZS5jb20ACgkQumpXJwqY6poY/gf9GgexhRSNp10orTltOFD9+c+g6ekn q4UiLK7ooz4mFqPN4ljrSxvF1IYkjgrkkPDDEPZEZl2bQ7yWFb1xO9csihZeSI0l Bf5m+Pxo+U2ylNr6wEsOS7P5GntraTkLJ4NHje/bYmIQMAjiowniTF3693FYs51d bCD4Xn0zzZi+eekoAi/34GL5Zzkk5jhr2nBBvUZ3mXrRlR/iNpwUd4IWxb1Ujbfh 9YjAAGbeBowHzsyfPKoccJ/ybosrUKGqpVrp4KPe0JVoCvw8nwkxAfHGhsjjVk10 G0l4eCZ8KW87rPoJw5HvmTTNIxM10xKuZ4fa67/9ou+kHWRzMSa6ub4Jiw== =JU3a -----END PGP SIGNATURE----- Merge tag 'modules-6.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux Pull module updates from Petr Pavlu: - Make .static_call_sites in modules read-only after init The .static_call_sites sections in modules have been made read-only after init to avoid any (non-)accidental modifications, similarly to how they are read-only after init in vmlinux - The rest are minor cleanups * tag 'modules-6.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux: module: Remove outdated comment about text_size module: Make .static_call_sites read-only after init module: Add a separate function to mark sections as read-only after init module: Constify parameters of module_enforce_rwx_sections()
This commit is contained in:
commit
c8be542408
3 changed files with 57 additions and 24 deletions
|
|
@ -322,8 +322,11 @@ int module_enable_rodata_ro(const struct module *mod);
|
|||
int module_enable_rodata_ro_after_init(const struct module *mod);
|
||||
int module_enable_data_nx(const struct module *mod);
|
||||
int module_enable_text_rox(const struct module *mod);
|
||||
int module_enforce_rwx_sections(Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
|
||||
char *secstrings, struct module *mod);
|
||||
int module_enforce_rwx_sections(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs,
|
||||
const char *secstrings,
|
||||
const struct module *mod);
|
||||
void module_mark_ro_after_init(const Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
|
||||
const char *secstrings);
|
||||
|
||||
#ifdef CONFIG_MODULE_SIG
|
||||
int module_sig_check(struct load_info *info, int flags);
|
||||
|
|
|
|||
|
|
@ -1562,12 +1562,11 @@ static void __layout_sections(struct module *mod, struct load_info *info, bool i
|
|||
{
|
||||
unsigned int m, i;
|
||||
|
||||
/*
|
||||
* { Mask of required section header flags,
|
||||
* Mask of excluded section header flags }
|
||||
*/
|
||||
static const unsigned long masks[][2] = {
|
||||
/*
|
||||
* NOTE: all executable code must be the first section
|
||||
* in this array; otherwise modify the text_size
|
||||
* finder in the two loops below
|
||||
*/
|
||||
{ SHF_EXECINSTR | SHF_ALLOC, ARCH_SHF_SMALL },
|
||||
{ SHF_ALLOC, SHF_WRITE | ARCH_SHF_SMALL },
|
||||
{ SHF_RO_AFTER_INIT | SHF_ALLOC, ARCH_SHF_SMALL },
|
||||
|
|
@ -2768,7 +2767,6 @@ core_param(module_blacklist, module_blacklist, charp, 0400);
|
|||
static struct module *layout_and_allocate(struct load_info *info, int flags)
|
||||
{
|
||||
struct module *mod;
|
||||
unsigned int ndx;
|
||||
int err;
|
||||
|
||||
/* Allow arches to frob section contents and sizes. */
|
||||
|
|
@ -2786,22 +2784,11 @@ static struct module *layout_and_allocate(struct load_info *info, int flags)
|
|||
info->sechdrs[info->index.pcpu].sh_flags &= ~(unsigned long)SHF_ALLOC;
|
||||
|
||||
/*
|
||||
* Mark ro_after_init section with SHF_RO_AFTER_INIT so that
|
||||
* layout_sections() can put it in the right place.
|
||||
* Mark relevant sections as SHF_RO_AFTER_INIT so layout_sections() can
|
||||
* put them in the right place.
|
||||
* Note: ro_after_init sections also have SHF_{WRITE,ALLOC} set.
|
||||
*/
|
||||
ndx = find_sec(info, ".data..ro_after_init");
|
||||
if (ndx)
|
||||
info->sechdrs[ndx].sh_flags |= SHF_RO_AFTER_INIT;
|
||||
/*
|
||||
* Mark the __jump_table section as ro_after_init as well: these data
|
||||
* structures are never modified, with the exception of entries that
|
||||
* refer to code in the __init section, which are annotated as such
|
||||
* at module load time.
|
||||
*/
|
||||
ndx = find_sec(info, "__jump_table");
|
||||
if (ndx)
|
||||
info->sechdrs[ndx].sh_flags |= SHF_RO_AFTER_INIT;
|
||||
module_mark_ro_after_init(info->hdr, info->sechdrs, info->secstrings);
|
||||
|
||||
/*
|
||||
* Determine total sizes, and put offsets in sh_entsize. For now
|
||||
|
|
|
|||
|
|
@ -87,8 +87,9 @@ int module_enable_data_nx(const struct module *mod)
|
|||
return 0;
|
||||
}
|
||||
|
||||
int module_enforce_rwx_sections(Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
|
||||
char *secstrings, struct module *mod)
|
||||
int module_enforce_rwx_sections(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs,
|
||||
const char *secstrings,
|
||||
const struct module *mod)
|
||||
{
|
||||
const unsigned long shf_wx = SHF_WRITE | SHF_EXECINSTR;
|
||||
int i;
|
||||
|
|
@ -106,3 +107,45 @@ int module_enforce_rwx_sections(Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
|
|||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static const char *const ro_after_init[] = {
|
||||
/*
|
||||
* Section .data..ro_after_init holds data explicitly annotated by
|
||||
* __ro_after_init.
|
||||
*/
|
||||
".data..ro_after_init",
|
||||
|
||||
/*
|
||||
* Section __jump_table holds data structures that are never modified,
|
||||
* with the exception of entries that refer to code in the __init
|
||||
* section, which are marked as such at module load time.
|
||||
*/
|
||||
"__jump_table",
|
||||
|
||||
#ifdef CONFIG_HAVE_STATIC_CALL_INLINE
|
||||
/*
|
||||
* Section .static_call_sites holds data structures that need to be
|
||||
* sorted and processed at module load time but are never modified
|
||||
* afterwards.
|
||||
*/
|
||||
".static_call_sites",
|
||||
#endif
|
||||
};
|
||||
|
||||
void module_mark_ro_after_init(const Elf_Ehdr *hdr, Elf_Shdr *sechdrs,
|
||||
const char *secstrings)
|
||||
{
|
||||
int i, j;
|
||||
|
||||
for (i = 1; i < hdr->e_shnum; i++) {
|
||||
Elf_Shdr *shdr = &sechdrs[i];
|
||||
|
||||
for (j = 0; j < ARRAY_SIZE(ro_after_init); j++) {
|
||||
if (strcmp(secstrings + shdr->sh_name,
|
||||
ro_after_init[j]) == 0) {
|
||||
shdr->sh_flags |= SHF_RO_AFTER_INIT;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue