lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAKwvOdnve7EAPzdTy1eMnGwYgXpNj+dFAwB-t+7PFASDiaM_iw@mail.gmail.com>
Date:   Wed, 17 May 2023 13:55:45 -0700
From:   Nick Desaulniers <ndesaulniers@...gle.com>
To:     Masahiro Yamada <masahiroy@...nel.org>
Cc:     linux-kbuild@...r.kernel.org, linux-kernel@...r.kernel.org,
        Nathan Chancellor <nathan@...nel.org>,
        Nicolas Pitre <npitre@...libre.com>,
        Nicolas Schier <nicolas@...sle.eu>
Subject: Re: [PATCH v5 07/21] modpost: squash extable_mismatch_handler() into default_mismatch_handler()

On Sun, May 14, 2023 at 8:28 AM Masahiro Yamada <masahiroy@...nel.org> wrote:
>
> Merging these two reduces several lines of code. The extable section
> mismatch is already distinguished by EXTABLE_TO_NON_TEXT.
>
> Signed-off-by: Masahiro Yamada <masahiroy@...nel.org>

Thanks for the patch!
Reviewed-by: Nick Desaulniers <ndesaulniers@...gle.com>

> ---
>
>  scripts/mod/modpost.c | 84 ++++++++++++++-----------------------------
>  1 file changed, 26 insertions(+), 58 deletions(-)
>
> diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> index 0bda2f22c985..49357a716519 100644
> --- a/scripts/mod/modpost.c
> +++ b/scripts/mod/modpost.c
> @@ -881,27 +881,14 @@ enum mismatch {
>   * targeting sections in this array (white-list).  Can be empty.
>   *
>   * @mismatch: Type of mismatch.
> - *
> - * @handler: Specific handler to call when a match is found.  If NULL,
> - * default_mismatch_handler() will be called.
> - *
>   */
>  struct sectioncheck {
>         const char *fromsec[20];
>         const char *bad_tosec[20];
>         const char *good_tosec[20];
>         enum mismatch mismatch;
> -       void (*handler)(const char *modname, struct elf_info *elf,
> -                       const struct sectioncheck* const mismatch,
> -                       Elf_Rela *r, Elf_Sym *sym, const char *fromsec);
> -
>  };
>
> -static void extable_mismatch_handler(const char *modname, struct elf_info *elf,
> -                                    const struct sectioncheck* const mismatch,
> -                                    Elf_Rela *r, Elf_Sym *sym,
> -                                    const char *fromsec);
> -
>  static const struct sectioncheck sectioncheck[] = {
>  /* Do not reference init/exit code/data from
>   * normal code and data
> @@ -974,7 +961,6 @@ static const struct sectioncheck sectioncheck[] = {
>         .bad_tosec = { ".altinstr_replacement", NULL },
>         .good_tosec = {ALL_TEXT_SECTIONS , NULL},
>         .mismatch = EXTABLE_TO_NON_TEXT,
> -       .handler = extable_mismatch_handler,
>  }
>  };
>
> @@ -1255,60 +1241,42 @@ static void default_mismatch_handler(const char *modname, struct elf_info *elf,
>                      modname, tosym, tosec);
>                 break;
>         case EXTABLE_TO_NON_TEXT:
> -               fatal("There's a special handler for this mismatch type, we should never get here.\n");
> +               warn("%s(%s+0x%lx): Section mismatch in reference to the %s:%s\n",
> +                    modname, fromsec, (long)r->r_offset, tosec, tosym);
> +
> +               if (match(tosec, mismatch->bad_tosec))
> +                       fatal("The relocation at %s+0x%lx references\n"
> +                             "section \"%s\" which is black-listed.\n"
> +                             "Something is seriously wrong and should be fixed.\n"
> +                             "You might get more information about where this is\n"
> +                             "coming from by using scripts/check_extable.sh %s\n",
> +                             fromsec, (long)r->r_offset, tosec, modname);
> +               else if (is_executable_section(elf, get_secindex(elf, sym)))
> +                       warn("The relocation at %s+0x%lx references\n"
> +                            "section \"%s\" which is not in the list of\n"
> +                            "authorized sections.  If you're adding a new section\n"
> +                            "and/or if this reference is valid, add \"%s\" to the\n"
> +                            "list of authorized sections to jump to on fault.\n"
> +                            "This can be achieved by adding \"%s\" to\n"
> +                            "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
> +                            fromsec, (long)r->r_offset, tosec, tosec, tosec);
> +               else
> +                       error("%s+0x%lx references non-executable section '%s'\n",
> +                             fromsec, (long)r->r_offset, tosec);
>                 break;
>         }
>  }
>
> -static void extable_mismatch_handler(const char* modname, struct elf_info *elf,
> -                                    const struct sectioncheck* const mismatch,
> -                                    Elf_Rela* r, Elf_Sym* sym,
> -                                    const char *fromsec)
> -{
> -       const char* tosec = sec_name(elf, get_secindex(elf, sym));
> -       Elf_Sym *tosym = find_elf_symbol(elf, r->r_addend, sym);
> -       const char *tosym_name = sym_name(elf, tosym);
> -
> -       sec_mismatch_count++;
> -
> -       warn("%s(%s+0x%lx): Section mismatch in reference to the %s:%s\n",
> -            modname, fromsec, (long)r->r_offset, tosec, tosym_name);
> -
> -       if (match(tosec, mismatch->bad_tosec))
> -               fatal("The relocation at %s+0x%lx references\n"
> -                     "section \"%s\" which is black-listed.\n"
> -                     "Something is seriously wrong and should be fixed.\n"
> -                     "You might get more information about where this is\n"
> -                     "coming from by using scripts/check_extable.sh %s\n",
> -                     fromsec, (long)r->r_offset, tosec, modname);
> -       else if (is_executable_section(elf, get_secindex(elf, sym)))
> -               warn("The relocation at %s+0x%lx references\n"
> -                    "section \"%s\" which is not in the list of\n"
> -                    "authorized sections.  If you're adding a new section\n"
> -                    "and/or if this reference is valid, add \"%s\" to the\n"
> -                    "list of authorized sections to jump to on fault.\n"
> -                    "This can be achieved by adding \"%s\" to\n"
> -                    "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
> -                    fromsec, (long)r->r_offset, tosec, tosec, tosec);
> -       else
> -               error("%s+0x%lx references non-executable section '%s'\n",
> -                     fromsec, (long)r->r_offset, tosec);
> -}
> -
>  static void check_section_mismatch(const char *modname, struct elf_info *elf,
>                                    Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
>  {
>         const char *tosec = sec_name(elf, get_secindex(elf, sym));
>         const struct sectioncheck *mismatch = section_mismatch(fromsec, tosec);
>
> -       if (mismatch) {
> -               if (mismatch->handler)
> -                       mismatch->handler(modname, elf,  mismatch,
> -                                         r, sym, fromsec);
> -               else
> -                       default_mismatch_handler(modname, elf, mismatch,
> -                                                r, sym, fromsec);
> -       }
> +       if (!mismatch)
> +               return;
> +
> +       default_mismatch_handler(modname, elf, mismatch, r, sym, fromsec);
>  }
>
>  static unsigned int *reloc_location(struct elf_info *elf,
> --
> 2.39.2
>


-- 
Thanks,
~Nick Desaulniers

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ