From patchwork Wed Oct 11 20:30:24 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Garnier X-Patchwork-Id: 10000619 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id ABF0D6037F for ; Wed, 11 Oct 2017 20:36:52 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9FDB528B37 for ; Wed, 11 Oct 2017 20:36:52 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 93C9028B69; Wed, 11 Oct 2017 20:36:52 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, RCVD_IN_DNSWL_MED, T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from mother.openwall.net (mother.openwall.net [195.42.179.200]) by mail.wl.linuxfoundation.org (Postfix) with SMTP id C5B4228B37 for ; Wed, 11 Oct 2017 20:36:51 +0000 (UTC) Received: (qmail 16107 invoked by uid 550); 11 Oct 2017 20:32:04 -0000 Mailing-List: contact kernel-hardening-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Delivered-To: mailing list kernel-hardening@lists.openwall.com Received: (qmail 15879 invoked from network); 11 Oct 2017 20:31:55 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=ORejggQw3Wlwy4oK6MB/ZyUK6opE9gp/HnKwzidxVUI=; b=ieYDWGn0qH/zGw/CqqZd3fl9o3Z9s8pTqGeVIJy4jCaRCGbtX4x7M2CHmpdH49SSXt a7182nV3oAVsRkHPbZaLv2FiK6XqMVSUBSrL/58YFia0BAgun659x1cs1BHfhCFk0U0a GB1iOa2h40ncrGV3B8j8l9MhVEfHUathrlGUoorOwgxjEGSf1VBQ9HB+3bMz68pOrXrS eCyEWfLzDFNAqfyh4FnrC1jLGxxMndlScn+cffev74MZHku7nJnDB61u50Q4t5y8Jf7r qxHUvUBdjqHhxfSyqpcq6tvrlceSnxSyxGdqjEXW+llT0k7WgqaEGG57mL/gEumWffmY Vznw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=ORejggQw3Wlwy4oK6MB/ZyUK6opE9gp/HnKwzidxVUI=; b=L7Kwg1ryZWnRnXxzQMNFmlWFAzs6zmG/9vtkiAFixNXz/09axFX/r3lCiU/459pklK VaxpdP2WnKmKmQJlFWaX/N5JRMQdlQAPeQEQaCeA6sPA+f8jX6AxY0j/4iJWYXAf5K2R +5857hDJBi+7K0xZnKuaGc7DkQiFWZNGhcDvDKc7R81fjJxNKzy5G1Dtc189ZrXYaVi2 eDEFWOx+0YESJT1CzDszsRa0RNSVOpi1mZS59QHXfb9pv63DpuunqjAWah2HXTa948Lg s5131P1yf1NqfTRZ9dEGh6tb8uIQyhxC3rqkTKjyL3cGp1p5JuIO0EYYkjzGN+w/Qm8G Ewsg== X-Gm-Message-State: AMCzsaXrVdqLHvsrThTeshbEz/UwQE4P84tvjO/Rr5/R6SC6a6Dt+pvD pV56bJe6Er0g5E+Ge2JpuRqfAQ== X-Google-Smtp-Source: AOwi7QAHkXKO36woid4crVnsZdwD6NtiNVuUhw/Lc+0GKUP2Zo6fMS59diLwW/DJuaPjFCz8fuFejQ== X-Received: by 10.159.218.7 with SMTP id v7mr190315plp.322.1507753903640; Wed, 11 Oct 2017 13:31:43 -0700 (PDT) From: Thomas Garnier To: Herbert Xu , "David S . Miller" , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , Peter Zijlstra , Josh Poimboeuf , Arnd Bergmann , Thomas Garnier , Kees Cook , Andrey Ryabinin , Matthias Kaehlcke , Tom Lendacky , Andy Lutomirski , "Kirill A . Shutemov" , Borislav Petkov , "Rafael J . Wysocki" , Len Brown , Pavel Machek , Juergen Gross , Chris Wright , Alok Kataria , Rusty Russell , Tejun Heo , Christoph Lameter , Boris Ostrovsky , Paul Gortmaker , Andrew Morton , Alexey Dobriyan , "Paul E . McKenney" , Nicolas Pitre , Borislav Petkov , "Luis R . Rodriguez" , Greg Kroah-Hartman , Christopher Li , Steven Rostedt , Jason Baron , Mika Westerberg , Dou Liyang , "Rafael J . Wysocki" , Lukas Wunner , Masahiro Yamada , Alexei Starovoitov , Daniel Borkmann , Markus Trippelsdorf , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Joerg Roedel , Rik van Riel , David Howells , Ard Biesheuvel , Waiman Long , Kyle Huey , Jonathan Corbet , Michal Hocko , Peter Foley , Paul Bolle , Jiri Kosina , "H . J . Lu" , Rob Landley , Baoquan He , =?UTF-8?q?Jan=20H=20=2E=20Sch=C3=B6nherr?= , Daniel Micay Cc: x86@kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, virtualization@lists.linux-foundation.org, xen-devel@lists.xenproject.org, linux-arch@vger.kernel.org, linux-sparse@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, kernel-hardening@lists.openwall.com Date: Wed, 11 Oct 2017 13:30:24 -0700 Message-Id: <20171011203027.11248-25-thgarnie@google.com> X-Mailer: git-send-email 2.15.0.rc0.271.g36b669edcc-goog In-Reply-To: <20171011203027.11248-1-thgarnie@google.com> References: <20171011203027.11248-1-thgarnie@google.com> Subject: [kernel-hardening] [PATCH v1 24/27] x86/mm: Make the x86 GOT read-only X-Virus-Scanned: ClamAV using ClamSMTP The GOT is changed during early boot when relocations are applied. Make it read-only directly. This table exists only for PIE binary. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- include/asm-generic/vmlinux.lds.h | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h index e549bff87c5b..a2301c292e26 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -279,6 +279,17 @@ VMLINUX_SYMBOL(__end_ro_after_init) = .; #endif +#ifdef CONFIG_X86_PIE +#define RO_GOT_X86 \ + .got : AT(ADDR(.got) - LOAD_OFFSET) { \ + VMLINUX_SYMBOL(__start_got) = .; \ + *(.got); \ + VMLINUX_SYMBOL(__end_got) = .; \ + } +#else +#define RO_GOT_X86 +#endif + /* * Read only Data */ @@ -335,6 +346,7 @@ VMLINUX_SYMBOL(__end_builtin_fw) = .; \ } \ \ + RO_GOT_X86 \ TRACEDATA \ \ /* Kernel symbol table: Normal symbols */ \