Linux default behavior against `.data` section

后端 未结 2 1740
栀梦
栀梦 2020-12-20 16:42

Story

Case 1

I accidentally wrote my Assembly code in the .data section. I compiled it and executed it. The program ran normally under Linux <

相关标签:
2条回答
  • 2020-12-20 17:16

    Your binary is missing PT_GNU_STACK. As such, this change appears to have been caused by commit 9fccc5c0c99f238aa1b0460fccbdb30a887e7036:

    From 9fccc5c0c99f238aa1b0460fccbdb30a887e7036 Mon Sep 17 00:00:00 2001
    From: Kees Cook <keescook@chromium.org>
    Date: Thu, 26 Mar 2020 23:48:17 -0700
    Subject: x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
    
    With modern x86 64-bit environments, there should never be a need for
    automatic READ_IMPLIES_EXEC, as the architecture is intended to always
    be execute-bit aware (as in, the default memory protection should be NX
    unless a region explicitly requests to be executable).
    
    There were very old x86_64 systems that lacked the NX bit, but for those,
    the NX bit is, obviously, unenforceable, so these changes should have
    no impact on them.
    
    Suggested-by: Hector Marco-Gisbert <hecmargi@upv.es>
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Borislav Petkov <bp@suse.de>
    Reviewed-by: Jason Gunthorpe <jgg@mellanox.com>
    Link: https://lkml.kernel.org/r/20200327064820.12602-4-keescook@chromium.org
    ---
     arch/x86/include/asm/elf.h | 4 ++--
     1 file changed, 2 insertions(+), 2 deletions(-)
    
    diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h
    index 397a1c74433ec..452beed7892bb 100644
    --- a/arch/x86/include/asm/elf.h
    +++ b/arch/x86/include/asm/elf.h
    @@ -287,7 +287,7 @@ extern u32 elf_hwcap2;
      *                 CPU: | lacks NX*  | has NX, ia32     | has NX, x86_64 |
      * ELF:                 |            |                  |                |
      * ---------------------|------------|------------------|----------------|
    - * missing PT_GNU_STACK | exec-all   | exec-all         | exec-all       |
    + * missing PT_GNU_STACK | exec-all   | exec-all         | exec-none      |
      * PT_GNU_STACK == RWX  | exec-stack | exec-stack       | exec-stack     |
      * PT_GNU_STACK == RW   | exec-none  | exec-none        | exec-none      |
      *
    @@ -303,7 +303,7 @@ extern u32 elf_hwcap2;
      *
      */
     #define elf_read_implies_exec(ex, executable_stack)    \
    -   (executable_stack == EXSTACK_DEFAULT)
    +   (mmap_is_ia32() && executable_stack == EXSTACK_DEFAULT)
     
     struct task_struct;
     
    -- 
    cgit 1.2.3-1.el7
    

    This was first present in the 5.8 series. See also Unexpected exec permission from mmap when assembly files included in the project.

    0 讨论(0)
  • 2020-12-20 17:21

    This is only a guess: I think the culprit is the READ_IMPLIES_EXEC personality that was being set automatically in the absence of a PT_GNU_STACK segment.

    In the 5.4 kernel source we can find this piece of code:

    SET_PERSONALITY2(loc->elf_ex, &arch_state);
    if (elf_read_implies_exec(loc->elf_ex, executable_stack))
        current->personality |= READ_IMPLIES_EXEC;
    

    That's the only thing that can transform an RW section into an RWX one. Any other use of PROC_EXEC didn't seem to be changed or relevant to this question, to me.

    The executable_stack is set here:

    for (i = 0; i < loc->elf_ex.e_phnum; i++, elf_ppnt++)
        switch (elf_ppnt->p_type) {
        case PT_GNU_STACK:
            if (elf_ppnt->p_flags & PF_X)
                executable_stack = EXSTACK_ENABLE_X;
            else
                executable_stack = EXSTACK_DISABLE_X;
            break;
    

    But if the PT_GNU_STACK segment is not present, that variable retains its default value:

    int executable_stack = EXSTACK_DEFAULT;
    

    Now this workflow is identical in both 5.4 and the latest kernel source, what changed is the definition of elf_read_implies_exec:

    Linux 5.4:

    /*
     * An executable for which elf_read_implies_exec() returns TRUE will
     * have the READ_IMPLIES_EXEC personality flag set automatically.
     */
    #define elf_read_implies_exec(ex, executable_stack) \
        (executable_stack != EXSTACK_DISABLE_X)
    

    Latest Linux:

    /*
     * An executable for which elf_read_implies_exec() returns TRUE will
     * have the READ_IMPLIES_EXEC personality flag set automatically.
     *
     * The decision process for determining the results are:
     *
     *                 CPU: | lacks NX*  | has NX, ia32     | has NX, x86_64 |
     * ELF:                 |            |                  |                |
     * ---------------------|------------|------------------|----------------|
     * missing PT_GNU_STACK | exec-all   | exec-all         | exec-none      |
     * PT_GNU_STACK == RWX  | exec-stack | exec-stack       | exec-stack     |
     * PT_GNU_STACK == RW   | exec-none  | exec-none        | exec-none      |
     *
     *  exec-all  : all PROT_READ user mappings are executable, except when
     *              backed by files on a noexec-filesystem.
     *  exec-none : only PROT_EXEC user mappings are executable.
     *  exec-stack: only the stack and PROT_EXEC user mappings are executable.
     *
     *  *this column has no architectural effect: NX markings are ignored by
     *   hardware, but may have behavioral effects when "wants X" collides with
     *   "cannot be X" constraints in memory permission flags, as in
     *   https://lkml.kernel.org/r/20190418055759.GA3155@mellanox.com
     *
     */
    #define elf_read_implies_exec(ex, executable_stack) \
        (mmap_is_ia32() && executable_stack == EXSTACK_DEFAULT)
    

    Note how in the 5.4 version the elf_read_implies_exec returned a true value if the stack was not explicitly marked as not executable (via the PT_GNU_STACK segment).

    In the latest source, the check is now more defensive: the elf_read_implies_exec is true only on 32-bit executable, in the case where no PT_GNU_STACK segment was found in the ELF binary.

    I assembled your program, linked it, and found no PT_GNU_STACK segment, so this may be the reason.
    If this is indeed the issue and if I followed the code correctly, if you set the stack as not executable in the binary, its data section should not be mapped executable anymore (not even on Linux 5.4).

    0 讨论(0)
提交回复
热议问题