Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190410195708.162185-3-joel@joelfernandes.org>
Date: Wed, 10 Apr 2019 15:57:08 -0400
From: "Joel Fernandes (Google)" <joel@...lfernandes.org>
To: linux-kernel@...r.kernel.org
Cc: "Joel Fernandes (Google)" <joel@...lfernandes.org>,
	paulmck@...ux.vnet.ibm.com,
	keescook@...omium.org,
	mathieu.desnoyers@...icios.com,
	rostedt@...dmis.org,
	Jessica Yu <jeyu@...nel.org>,
	kernel-hardening@...ts.openwall.com,
	kernel-team@...roid.com,
	rcu@...r.kernel.org
Subject: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only

This series hardens the tracepoints in modules by making the array of
pointers referring to the tracepoints as read-only. This array is needed
during module unloading to verify that the tracepoint is quiescent.
There is no reason for the array to be to be writable after init, and
can cause security or other hidden bugs. Mark these as ro_after_init.

Suggested-by: paulmck@...ux.vnet.ibm.com
Suggested-by: keescook@...omium.org
Suggested-by: mathieu.desnoyers@...icios.com
Cc: rostedt@...dmis.org
Signed-off-by: Joel Fernandes (Google) <joel@...lfernandes.org>
---
 kernel/module.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/kernel/module.c b/kernel/module.c
index 8b9631e789f0..be980aaa8804 100644
--- a/kernel/module.c
+++ b/kernel/module.c
@@ -3320,6 +3320,12 @@ static const char * const ro_after_init_sections[] = {
 	 * by the SRCU notifiers
 	 */
 	"___srcu_struct_ptrs",
+
+	/*
+	 * Array of tracepoint pointers used for checking if tracepoints are
+	 * quiescent during unloading.
+	 */
+	"__tracepoints_ptrs",
 };
 
 static struct module *layout_and_allocate(struct load_info *info, int flags)
-- 
2.21.0.392.gf8f6787159e-goog

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.