Blame view
kernel/extable.c
3.84 KB
1da177e4c
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 |
/* Rewritten by Rusty Russell, on the backs of many others... Copyright (C) 2001 Rusty Russell, 2002 Rusty Russell IBM. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ |
505f2b970
|
18 |
#include <linux/ftrace.h> |
f80d2d772
|
19 |
#include <linux/memory.h> |
1da177e4c
|
20 |
#include <linux/module.h> |
505f2b970
|
21 |
#include <linux/mutex.h> |
1da177e4c
|
22 |
#include <linux/init.h> |
505f2b970
|
23 |
|
1da177e4c
|
24 |
#include <asm/sections.h> |
505f2b970
|
25 26 27 28 29 30 31 32 33 |
#include <asm/uaccess.h> /* * mutex protecting text section modification (dynamic code patching). * some users need to sleep (allocating memory...) while they hold this lock. * * NOT exported to modules - patching kernel text is a really delicate matter. */ DEFINE_MUTEX(text_mutex); |
1da177e4c
|
34 35 36 |
extern struct exception_table_entry __start___ex_table[]; extern struct exception_table_entry __stop___ex_table[]; |
d219e2e86
|
37 38 |
/* Cleared by build time tools if the table is already sorted. */ u32 __initdata main_extable_sort_needed = 1; |
1da177e4c
|
39 40 41 |
/* Sort the kernel's built-in exception table */ void __init sort_main_extable(void) { |
bec1b9e76
|
42 43 44 |
if (main_extable_sort_needed) { pr_notice("Sorting __ex_table... "); |
d219e2e86
|
45 |
sort_extable(__start___ex_table, __stop___ex_table); |
bec1b9e76
|
46 |
} |
1da177e4c
|
47 48 49 50 51 52 53 54 55 56 57 58 |
} /* Given an address, look for it in the exception tables. */ const struct exception_table_entry *search_exception_tables(unsigned long addr) { const struct exception_table_entry *e; e = search_extable(__start___ex_table, __stop___ex_table-1, addr); if (!e) e = search_module_extables(addr); return e; } |
4a44bac1f
|
59 60 61 62 63 64 65 |
static inline int init_kernel_text(unsigned long addr) { if (addr >= (unsigned long)_sinittext && addr <= (unsigned long)_einittext) return 1; return 0; } |
3861a17bc
|
66 |
int core_kernel_text(unsigned long addr) |
1da177e4c
|
67 68 69 70 |
{ if (addr >= (unsigned long)_stext && addr <= (unsigned long)_etext) return 1; |
a2da4052f
|
71 |
if (system_state == SYSTEM_BOOTING && |
4a44bac1f
|
72 |
init_kernel_text(addr)) |
1da177e4c
|
73 74 75 |
return 1; return 0; } |
a2d063ac2
|
76 77 78 79 80 81 82 83 84 85 |
/** * core_kernel_data - tell if addr points to kernel data * @addr: address to test * * Returns true if @addr passed in is from the core kernel data * section. * * Note: On some archs it may return true for core RODATA, and false * for others. But will always be true for core RW data. */ |
cdbe61bfe
|
86 87 |
int core_kernel_data(unsigned long addr) { |
a2d063ac2
|
88 |
if (addr >= (unsigned long)_sdata && |
cdbe61bfe
|
89 90 91 92 |
addr < (unsigned long)_edata) return 1; return 0; } |
3861a17bc
|
93 |
int __kernel_text_address(unsigned long addr) |
1da177e4c
|
94 95 96 |
{ if (core_kernel_text(addr)) return 1; |
cab4e4c43
|
97 |
if (is_module_text_address(addr)) |
4a44bac1f
|
98 99 100 101 102 103 104 105 106 107 108 109 |
return 1; /* * There might be init symbols in saved stacktraces. * Give those symbols a chance to be printed in * backtraces (such as lockdep traces). * * Since we are after the module-symbols check, there's * no danger of address overlap: */ if (init_kernel_text(addr)) return 1; return 0; |
1da177e4c
|
110 111 112 113 114 115 |
} int kernel_text_address(unsigned long addr) { if (core_kernel_text(addr)) return 1; |
a6e6abd57
|
116 |
return is_module_text_address(addr); |
1da177e4c
|
117 |
} |
ab7476cf7
|
118 119 120 121 122 123 124 125 126 127 128 129 130 131 |
/* * On some architectures (PPC64, IA64) function pointers * are actually only tokens to some data that then holds the * real function address. As a result, to find if a function * pointer is part of the kernel text, we need to do some * special dereferencing first. */ int func_ptr_is_kernel_text(void *ptr) { unsigned long addr; addr = (unsigned long) dereference_function_descriptor(ptr); if (core_kernel_text(addr)) return 1; |
a6e6abd57
|
132 |
return is_module_text_address(addr); |
ab7476cf7
|
133 |
} |