[PATCH bpf-next] bpf: Make trampolines W^X

Justin Capella justincapella at gmail.com
Sun Jan 5 01:19:14 UTC 2020


I'm guessing 2 pages are used to allow for different protections? Does
only the first page's protections need to be changed? Is that
"old_image"?

+       set_memory_nx((unsigned long)image, 1);
+       set_memory_rw((unsigned long)image, 1);

+       set_memory_ro((unsigned long)new_image, 1);
+       set_memory_x((unsigned long)new_image, 1);

Because

+       void *old_image = tr->image + ((tr->selector + 1) & 1) * PAGE_SIZE;
+       void *new_image = tr->image + (tr->selector & 1) * PAGE_SIZE


> > - Mark the memory as read-only (set_memory_ro)
> > - Mark the memory as executable (set_memory_x)
>
> No, thanks. There’s very little excuse for doing two IPI flushes when one would suffice.

If there were checks between these steps to verify the trampoline
wasn't tampered with while the page was writable it would make sense
to do so before enabling execution.

Could some of these int's be unsigned to be extra cautious?

One last thought, if the extra checks are implemented, maybe comparing
against the old image prior to setting rw would be worthwhile?



More information about the Linux-security-module-archive mailing list