Blame view
kernel/extable.c
4.73 KB
1da177e4c
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 |
/* Rewritten by Rusty Russell, on the backs of many others... Copyright (C) 2001 Rusty Russell, 2002 Rusty Russell IBM. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ |
505f2b970
|
18 |
#include <linux/ftrace.h> |
f80d2d772
|
19 |
#include <linux/memory.h> |
8a293be0d
|
20 |
#include <linux/extable.h> |
1da177e4c
|
21 |
#include <linux/module.h> |
505f2b970
|
22 |
#include <linux/mutex.h> |
1da177e4c
|
23 |
#include <linux/init.h> |
5b485629b
|
24 |
#include <linux/kprobes.h> |
74451e66d
|
25 |
#include <linux/filter.h> |
505f2b970
|
26 |
|
1da177e4c
|
27 |
#include <asm/sections.h> |
7c0f6ba68
|
28 |
#include <linux/uaccess.h> |
505f2b970
|
29 30 31 32 33 34 35 36 |
/* * mutex protecting text section modification (dynamic code patching). * some users need to sleep (allocating memory...) while they hold this lock. * * NOT exported to modules - patching kernel text is a really delicate matter. */ DEFINE_MUTEX(text_mutex); |
1da177e4c
|
37 38 39 |
extern struct exception_table_entry __start___ex_table[]; extern struct exception_table_entry __stop___ex_table[]; |
d219e2e86
|
40 |
/* Cleared by build time tools if the table is already sorted. */ |
00b710307
|
41 |
u32 __initdata __visible main_extable_sort_needed = 1; |
d219e2e86
|
42 |
|
1da177e4c
|
43 44 45 |
/* Sort the kernel's built-in exception table */ void __init sort_main_extable(void) { |
e656a6341
|
46 |
if (main_extable_sort_needed && __stop___ex_table > __start___ex_table) { |
bec1b9e76
|
47 48 |
pr_notice("Sorting __ex_table... "); |
d219e2e86
|
49 |
sort_extable(__start___ex_table, __stop___ex_table); |
bec1b9e76
|
50 |
} |
1da177e4c
|
51 52 53 54 55 56 |
} /* Given an address, look for it in the exception tables. */ const struct exception_table_entry *search_exception_tables(unsigned long addr) { const struct exception_table_entry *e; |
a94c33dd1
|
57 58 |
e = search_extable(__start___ex_table, __stop___ex_table - __start___ex_table, addr); |
1da177e4c
|
59 60 61 62 |
if (!e) e = search_module_extables(addr); return e; } |
4a44bac1f
|
63 64 65 |
static inline int init_kernel_text(unsigned long addr) { if (addr >= (unsigned long)_sinittext && |
5ecbe3c3c
|
66 |
addr < (unsigned long)_einittext) |
4a44bac1f
|
67 68 69 |
return 1; return 0; } |
c0d80ddab
|
70 |
int notrace core_kernel_text(unsigned long addr) |
1da177e4c
|
71 72 |
{ if (addr >= (unsigned long)_stext && |
5ecbe3c3c
|
73 |
addr < (unsigned long)_etext) |
1da177e4c
|
74 |
return 1; |
0594729c2
|
75 |
if (system_state < SYSTEM_RUNNING && |
4a44bac1f
|
76 |
init_kernel_text(addr)) |
1da177e4c
|
77 78 79 |
return 1; return 0; } |
a2d063ac2
|
80 81 82 83 84 85 86 87 88 89 |
/** * core_kernel_data - tell if addr points to kernel data * @addr: address to test * * Returns true if @addr passed in is from the core kernel data * section. * * Note: On some archs it may return true for core RODATA, and false * for others. But will always be true for core RW data. */ |
cdbe61bfe
|
90 91 |
int core_kernel_data(unsigned long addr) { |
a2d063ac2
|
92 |
if (addr >= (unsigned long)_sdata && |
cdbe61bfe
|
93 94 95 96 |
addr < (unsigned long)_edata) return 1; return 0; } |
3861a17bc
|
97 |
int __kernel_text_address(unsigned long addr) |
1da177e4c
|
98 |
{ |
9aadde91b
|
99 |
if (kernel_text_address(addr)) |
74451e66d
|
100 |
return 1; |
4a44bac1f
|
101 102 103 104 105 106 107 108 109 110 111 |
/* * There might be init symbols in saved stacktraces. * Give those symbols a chance to be printed in * backtraces (such as lockdep traces). * * Since we are after the module-symbols check, there's * no danger of address overlap: */ if (init_kernel_text(addr)) return 1; return 0; |
1da177e4c
|
112 113 114 115 |
} int kernel_text_address(unsigned long addr) { |
e8cac8b1d
|
116 117 |
bool no_rcu; int ret = 1; |
1da177e4c
|
118 119 |
if (core_kernel_text(addr)) return 1; |
e8cac8b1d
|
120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 |
/* * If a stack dump happens while RCU is not watching, then * RCU needs to be notified that it requires to start * watching again. This can happen either by tracing that * triggers a stack trace, or a WARN() that happens during * coming back from idle, or cpu on or offlining. * * is_module_text_address() as well as the kprobe slots * and is_bpf_text_address() require RCU to be watching. */ no_rcu = !rcu_is_watching(); /* Treat this like an NMI as it can happen anywhere */ if (no_rcu) rcu_nmi_enter(); |
aec0be2d6
|
136 |
if (is_module_text_address(addr)) |
e8cac8b1d
|
137 |
goto out; |
5b485629b
|
138 |
if (is_ftrace_trampoline(addr)) |
e8cac8b1d
|
139 |
goto out; |
5b485629b
|
140 |
if (is_kprobe_optinsn_slot(addr) || is_kprobe_insn_slot(addr)) |
e8cac8b1d
|
141 |
goto out; |
74451e66d
|
142 |
if (is_bpf_text_address(addr)) |
e8cac8b1d
|
143 144 145 146 147 148 149 |
goto out; ret = 0; out: if (no_rcu) rcu_nmi_exit(); return ret; |
1da177e4c
|
150 |
} |
ab7476cf7
|
151 152 153 154 155 156 157 158 159 160 161 162 163 164 |
/* * On some architectures (PPC64, IA64) function pointers * are actually only tokens to some data that then holds the * real function address. As a result, to find if a function * pointer is part of the kernel text, we need to do some * special dereferencing first. */ int func_ptr_is_kernel_text(void *ptr) { unsigned long addr; addr = (unsigned long) dereference_function_descriptor(ptr); if (core_kernel_text(addr)) return 1; |
a6e6abd57
|
165 |
return is_module_text_address(addr); |
ab7476cf7
|
166 |
} |