mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-22 12:14:01 +08:00
cb9e3c292d
For instrumenting global variables KASan will shadow memory backing memory for modules. So on module loading we will need to allocate memory for shadow and map it at address in shadow that corresponds to the address allocated in module_alloc(). __vmalloc_node_range() could be used for this purpose, except it puts a guard hole after allocated area. Guard hole in shadow memory should be a problem because at some future point we might need to have a shadow memory at address occupied by guard hole. So we could fail to allocate shadow for module_alloc(). Now we have VM_NO_GUARD flag disabling guard page, so we need to pass into __vmalloc_node_range(). Add new parameter 'vm_flags' to __vmalloc_node_range() function. Signed-off-by: Andrey Ryabinin <a.ryabinin@samsung.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: Konstantin Serebryany <kcc@google.com> Cc: Dmitry Chernenkov <dmitryc@google.com> Signed-off-by: Andrey Konovalov <adech.fo@gmail.com> Cc: Yuri Gribov <tetra2005@gmail.com> Cc: Konstantin Khlebnikov <koct9i@gmail.com> Cc: Sasha Levin <sasha.levin@oracle.com> Cc: Christoph Lameter <cl@linux.com> Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com> Cc: Dave Hansen <dave.hansen@intel.com> Cc: Andi Kleen <andi@firstfloor.org> Cc: Ingo Molnar <mingo@elte.hu> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: "H. Peter Anvin" <hpa@zytor.com> Cc: Christoph Lameter <cl@linux.com> Cc: Pekka Enberg <penberg@kernel.org> Cc: David Rientjes <rientjes@google.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
228 lines
5.1 KiB
C
228 lines
5.1 KiB
C
/* Kernel module help for sparc64.
|
|
*
|
|
* Copyright (C) 2001 Rusty Russell.
|
|
* Copyright (C) 2002 David S. Miller.
|
|
*/
|
|
|
|
#include <linux/moduleloader.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/elf.h>
|
|
#include <linux/vmalloc.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/gfp.h>
|
|
#include <linux/string.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/mm.h>
|
|
|
|
#include <asm/processor.h>
|
|
#include <asm/spitfire.h>
|
|
#include <asm/cacheflush.h>
|
|
|
|
#include "entry.h"
|
|
|
|
#ifdef CONFIG_SPARC64
|
|
|
|
#include <linux/jump_label.h>
|
|
|
|
static void *module_map(unsigned long size)
|
|
{
|
|
if (PAGE_ALIGN(size) > MODULES_LEN)
|
|
return NULL;
|
|
return __vmalloc_node_range(size, 1, MODULES_VADDR, MODULES_END,
|
|
GFP_KERNEL, PAGE_KERNEL, 0, NUMA_NO_NODE,
|
|
__builtin_return_address(0));
|
|
}
|
|
#else
|
|
static void *module_map(unsigned long size)
|
|
{
|
|
return vmalloc(size);
|
|
}
|
|
#endif /* CONFIG_SPARC64 */
|
|
|
|
void *module_alloc(unsigned long size)
|
|
{
|
|
void *ret;
|
|
|
|
ret = module_map(size);
|
|
if (ret)
|
|
memset(ret, 0, size);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Make generic code ignore STT_REGISTER dummy undefined symbols. */
|
|
int module_frob_arch_sections(Elf_Ehdr *hdr,
|
|
Elf_Shdr *sechdrs,
|
|
char *secstrings,
|
|
struct module *mod)
|
|
{
|
|
unsigned int symidx;
|
|
Elf_Sym *sym;
|
|
char *strtab;
|
|
int i;
|
|
|
|
for (symidx = 0; sechdrs[symidx].sh_type != SHT_SYMTAB; symidx++) {
|
|
if (symidx == hdr->e_shnum-1) {
|
|
printk("%s: no symtab found.\n", mod->name);
|
|
return -ENOEXEC;
|
|
}
|
|
}
|
|
sym = (Elf_Sym *)sechdrs[symidx].sh_addr;
|
|
strtab = (char *)sechdrs[sechdrs[symidx].sh_link].sh_addr;
|
|
|
|
for (i = 1; i < sechdrs[symidx].sh_size / sizeof(Elf_Sym); i++) {
|
|
if (sym[i].st_shndx == SHN_UNDEF) {
|
|
if (ELF_ST_TYPE(sym[i].st_info) == STT_REGISTER)
|
|
sym[i].st_shndx = SHN_ABS;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int apply_relocate_add(Elf_Shdr *sechdrs,
|
|
const char *strtab,
|
|
unsigned int symindex,
|
|
unsigned int relsec,
|
|
struct module *me)
|
|
{
|
|
unsigned int i;
|
|
Elf_Rela *rel = (void *)sechdrs[relsec].sh_addr;
|
|
Elf_Sym *sym;
|
|
u8 *location;
|
|
u32 *loc32;
|
|
|
|
for (i = 0; i < sechdrs[relsec].sh_size / sizeof(*rel); i++) {
|
|
Elf_Addr v;
|
|
|
|
/* This is where to make the change */
|
|
location = (u8 *)sechdrs[sechdrs[relsec].sh_info].sh_addr
|
|
+ rel[i].r_offset;
|
|
loc32 = (u32 *) location;
|
|
|
|
#ifdef CONFIG_SPARC64
|
|
BUG_ON(((u64)location >> (u64)32) != (u64)0);
|
|
#endif /* CONFIG_SPARC64 */
|
|
|
|
/* This is the symbol it is referring to. Note that all
|
|
undefined symbols have been resolved. */
|
|
sym = (Elf_Sym *)sechdrs[symindex].sh_addr
|
|
+ ELF_R_SYM(rel[i].r_info);
|
|
v = sym->st_value + rel[i].r_addend;
|
|
|
|
switch (ELF_R_TYPE(rel[i].r_info) & 0xff) {
|
|
case R_SPARC_DISP32:
|
|
v -= (Elf_Addr) location;
|
|
*loc32 = v;
|
|
break;
|
|
#ifdef CONFIG_SPARC64
|
|
case R_SPARC_64:
|
|
location[0] = v >> 56;
|
|
location[1] = v >> 48;
|
|
location[2] = v >> 40;
|
|
location[3] = v >> 32;
|
|
location[4] = v >> 24;
|
|
location[5] = v >> 16;
|
|
location[6] = v >> 8;
|
|
location[7] = v >> 0;
|
|
break;
|
|
|
|
case R_SPARC_WDISP19:
|
|
v -= (Elf_Addr) location;
|
|
*loc32 = (*loc32 & ~0x7ffff) |
|
|
((v >> 2) & 0x7ffff);
|
|
break;
|
|
|
|
case R_SPARC_OLO10:
|
|
*loc32 = (*loc32 & ~0x1fff) |
|
|
(((v & 0x3ff) +
|
|
(ELF_R_TYPE(rel[i].r_info) >> 8))
|
|
& 0x1fff);
|
|
break;
|
|
#endif /* CONFIG_SPARC64 */
|
|
|
|
case R_SPARC_32:
|
|
case R_SPARC_UA32:
|
|
location[0] = v >> 24;
|
|
location[1] = v >> 16;
|
|
location[2] = v >> 8;
|
|
location[3] = v >> 0;
|
|
break;
|
|
|
|
case R_SPARC_WDISP30:
|
|
v -= (Elf_Addr) location;
|
|
*loc32 = (*loc32 & ~0x3fffffff) |
|
|
((v >> 2) & 0x3fffffff);
|
|
break;
|
|
|
|
case R_SPARC_WDISP22:
|
|
v -= (Elf_Addr) location;
|
|
*loc32 = (*loc32 & ~0x3fffff) |
|
|
((v >> 2) & 0x3fffff);
|
|
break;
|
|
|
|
case R_SPARC_LO10:
|
|
*loc32 = (*loc32 & ~0x3ff) | (v & 0x3ff);
|
|
break;
|
|
|
|
case R_SPARC_HI22:
|
|
*loc32 = (*loc32 & ~0x3fffff) |
|
|
((v >> 10) & 0x3fffff);
|
|
break;
|
|
|
|
default:
|
|
printk(KERN_ERR "module %s: Unknown relocation: %x\n",
|
|
me->name,
|
|
(int) (ELF_R_TYPE(rel[i].r_info) & 0xff));
|
|
return -ENOEXEC;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#ifdef CONFIG_SPARC64
|
|
static void do_patch_sections(const Elf_Ehdr *hdr,
|
|
const Elf_Shdr *sechdrs)
|
|
{
|
|
const Elf_Shdr *s, *sun4v_1insn = NULL, *sun4v_2insn = NULL;
|
|
char *secstrings = (void *)hdr + sechdrs[hdr->e_shstrndx].sh_offset;
|
|
|
|
for (s = sechdrs; s < sechdrs + hdr->e_shnum; s++) {
|
|
if (!strcmp(".sun4v_1insn_patch", secstrings + s->sh_name))
|
|
sun4v_1insn = s;
|
|
if (!strcmp(".sun4v_2insn_patch", secstrings + s->sh_name))
|
|
sun4v_2insn = s;
|
|
}
|
|
|
|
if (sun4v_1insn && tlb_type == hypervisor) {
|
|
void *p = (void *) sun4v_1insn->sh_addr;
|
|
sun4v_patch_1insn_range(p, p + sun4v_1insn->sh_size);
|
|
}
|
|
if (sun4v_2insn && tlb_type == hypervisor) {
|
|
void *p = (void *) sun4v_2insn->sh_addr;
|
|
sun4v_patch_2insn_range(p, p + sun4v_2insn->sh_size);
|
|
}
|
|
}
|
|
|
|
int module_finalize(const Elf_Ehdr *hdr,
|
|
const Elf_Shdr *sechdrs,
|
|
struct module *me)
|
|
{
|
|
/* make jump label nops */
|
|
jump_label_apply_nops(me);
|
|
|
|
do_patch_sections(hdr, sechdrs);
|
|
|
|
/* Cheetah's I-cache is fully coherent. */
|
|
if (tlb_type == spitfire) {
|
|
unsigned long va;
|
|
|
|
flushw_all();
|
|
for (va = 0; va < (PAGE_SIZE << 1); va += 32)
|
|
spitfire_put_icache_tag(va, 0x0);
|
|
__asm__ __volatile__("flush %g6");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_SPARC64 */
|