2006-03-23 03:59:32 -07:00
|
|
|
#include <linux/module.h>
|
2006-10-17 23:47:25 -06:00
|
|
|
#include <linux/sched.h>
|
2006-03-23 03:59:32 -07:00
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/list.h>
|
2007-07-22 03:12:31 -06:00
|
|
|
#include <linux/kprobes.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/vmalloc.h>
|
2006-03-23 03:59:32 -07:00
|
|
|
#include <asm/alternative.h>
|
|
|
|
#include <asm/sections.h>
|
2007-07-22 03:12:31 -06:00
|
|
|
#include <asm/pgtable.h>
|
2007-07-22 03:12:32 -06:00
|
|
|
#include <asm/mce.h>
|
|
|
|
#include <asm/nmi.h>
|
2007-10-14 14:57:45 -06:00
|
|
|
#include <asm/vsyscall.h>
|
2008-03-06 06:48:49 -07:00
|
|
|
#include <asm/cacheflush.h>
|
|
|
|
#include <asm/io.h>
|
2006-03-23 03:59:32 -07:00
|
|
|
|
2007-08-10 14:31:03 -06:00
|
|
|
#define MAX_PATCH_LEN (255-1)
|
|
|
|
|
2007-07-21 09:10:25 -06:00
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
|
|
|
static int smp_alt_once;
|
2006-03-23 03:59:32 -07:00
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
static int __init bootonly(char *str)
|
|
|
|
{
|
|
|
|
smp_alt_once = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2007-05-02 11:27:13 -06:00
|
|
|
__setup("smp-alt-boot", bootonly);
|
2007-07-21 09:10:25 -06:00
|
|
|
#else
|
|
|
|
#define smp_alt_once 1
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static int debug_alternative;
|
2007-05-02 11:27:13 -06:00
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
static int __init debug_alt(char *str)
|
|
|
|
{
|
|
|
|
debug_alternative = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("debug-alternative", debug_alt);
|
|
|
|
|
2007-07-21 09:10:25 -06:00
|
|
|
static int noreplace_smp;
|
|
|
|
|
2007-05-02 11:27:13 -06:00
|
|
|
static int __init setup_noreplace_smp(char *str)
|
|
|
|
{
|
|
|
|
noreplace_smp = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("noreplace-smp", setup_noreplace_smp);
|
|
|
|
|
2007-05-02 11:27:16 -06:00
|
|
|
#ifdef CONFIG_PARAVIRT
|
|
|
|
static int noreplace_paravirt = 0;
|
|
|
|
|
|
|
|
static int __init setup_noreplace_paravirt(char *str)
|
|
|
|
{
|
|
|
|
noreplace_paravirt = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("noreplace-paravirt", setup_noreplace_paravirt);
|
|
|
|
#endif
|
2007-05-02 11:27:13 -06:00
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
#define DPRINTK(fmt, args...) if (debug_alternative) \
|
|
|
|
printk(KERN_DEBUG fmt, args)
|
|
|
|
|
|
|
|
#ifdef GENERIC_NOP1
|
2006-03-23 03:59:32 -07:00
|
|
|
/* Use inline assembly to define this because the nops are defined
|
|
|
|
as inline assembly strings in the include files and we cannot
|
|
|
|
get them easily into strings. */
|
2007-10-17 10:04:37 -06:00
|
|
|
asm("\t.section .rodata, \"a\"\nintelnops: "
|
2006-03-23 03:59:32 -07:00
|
|
|
GENERIC_NOP1 GENERIC_NOP2 GENERIC_NOP3 GENERIC_NOP4 GENERIC_NOP5 GENERIC_NOP6
|
2008-04-09 17:04:07 -06:00
|
|
|
GENERIC_NOP7 GENERIC_NOP8
|
|
|
|
"\t.previous");
|
2007-10-17 10:04:37 -06:00
|
|
|
extern const unsigned char intelnops[];
|
|
|
|
static const unsigned char *const intel_nops[ASM_NOP_MAX+1] = {
|
2006-03-23 03:59:32 -07:00
|
|
|
NULL,
|
|
|
|
intelnops,
|
|
|
|
intelnops + 1,
|
|
|
|
intelnops + 1 + 2,
|
|
|
|
intelnops + 1 + 2 + 3,
|
|
|
|
intelnops + 1 + 2 + 3 + 4,
|
|
|
|
intelnops + 1 + 2 + 3 + 4 + 5,
|
|
|
|
intelnops + 1 + 2 + 3 + 4 + 5 + 6,
|
|
|
|
intelnops + 1 + 2 + 3 + 4 + 5 + 6 + 7,
|
|
|
|
};
|
2006-06-26 05:56:16 -06:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef K8_NOP1
|
2007-10-17 10:04:37 -06:00
|
|
|
asm("\t.section .rodata, \"a\"\nk8nops: "
|
2006-06-26 05:56:16 -06:00
|
|
|
K8_NOP1 K8_NOP2 K8_NOP3 K8_NOP4 K8_NOP5 K8_NOP6
|
2008-04-09 17:04:07 -06:00
|
|
|
K8_NOP7 K8_NOP8
|
|
|
|
"\t.previous");
|
2007-10-17 10:04:37 -06:00
|
|
|
extern const unsigned char k8nops[];
|
|
|
|
static const unsigned char *const k8_nops[ASM_NOP_MAX+1] = {
|
2006-03-23 03:59:32 -07:00
|
|
|
NULL,
|
|
|
|
k8nops,
|
|
|
|
k8nops + 1,
|
|
|
|
k8nops + 1 + 2,
|
|
|
|
k8nops + 1 + 2 + 3,
|
|
|
|
k8nops + 1 + 2 + 3 + 4,
|
|
|
|
k8nops + 1 + 2 + 3 + 4 + 5,
|
|
|
|
k8nops + 1 + 2 + 3 + 4 + 5 + 6,
|
|
|
|
k8nops + 1 + 2 + 3 + 4 + 5 + 6 + 7,
|
|
|
|
};
|
2006-06-26 05:56:16 -06:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef K7_NOP1
|
2007-10-17 10:04:37 -06:00
|
|
|
asm("\t.section .rodata, \"a\"\nk7nops: "
|
2006-06-26 05:56:16 -06:00
|
|
|
K7_NOP1 K7_NOP2 K7_NOP3 K7_NOP4 K7_NOP5 K7_NOP6
|
2008-04-09 17:04:07 -06:00
|
|
|
K7_NOP7 K7_NOP8
|
|
|
|
"\t.previous");
|
2007-10-17 10:04:37 -06:00
|
|
|
extern const unsigned char k7nops[];
|
|
|
|
static const unsigned char *const k7_nops[ASM_NOP_MAX+1] = {
|
2006-03-23 03:59:32 -07:00
|
|
|
NULL,
|
|
|
|
k7nops,
|
|
|
|
k7nops + 1,
|
|
|
|
k7nops + 1 + 2,
|
|
|
|
k7nops + 1 + 2 + 3,
|
|
|
|
k7nops + 1 + 2 + 3 + 4,
|
|
|
|
k7nops + 1 + 2 + 3 + 4 + 5,
|
|
|
|
k7nops + 1 + 2 + 3 + 4 + 5 + 6,
|
|
|
|
k7nops + 1 + 2 + 3 + 4 + 5 + 6 + 7,
|
|
|
|
};
|
2006-06-26 05:56:16 -06:00
|
|
|
#endif
|
|
|
|
|
2007-10-17 10:04:41 -06:00
|
|
|
#ifdef P6_NOP1
|
|
|
|
asm("\t.section .rodata, \"a\"\np6nops: "
|
|
|
|
P6_NOP1 P6_NOP2 P6_NOP3 P6_NOP4 P6_NOP5 P6_NOP6
|
2008-04-09 17:04:07 -06:00
|
|
|
P6_NOP7 P6_NOP8
|
|
|
|
"\t.previous");
|
2007-10-17 10:04:41 -06:00
|
|
|
extern const unsigned char p6nops[];
|
|
|
|
static const unsigned char *const p6_nops[ASM_NOP_MAX+1] = {
|
|
|
|
NULL,
|
|
|
|
p6nops,
|
|
|
|
p6nops + 1,
|
|
|
|
p6nops + 1 + 2,
|
|
|
|
p6nops + 1 + 2 + 3,
|
|
|
|
p6nops + 1 + 2 + 3 + 4,
|
|
|
|
p6nops + 1 + 2 + 3 + 4 + 5,
|
|
|
|
p6nops + 1 + 2 + 3 + 4 + 5 + 6,
|
|
|
|
p6nops + 1 + 2 + 3 + 4 + 5 + 6 + 7,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
|
|
|
|
extern char __vsyscall_0;
|
2007-10-17 10:04:37 -06:00
|
|
|
static inline const unsigned char*const * find_nop_table(void)
|
2006-06-26 05:56:16 -06:00
|
|
|
{
|
2007-10-17 10:04:41 -06:00
|
|
|
return boot_cpu_data.x86_vendor != X86_VENDOR_INTEL ||
|
|
|
|
boot_cpu_data.x86 < 6 ? k8_nops : p6_nops;
|
2006-06-26 05:56:16 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
#else /* CONFIG_X86_64 */
|
|
|
|
|
2007-10-17 10:04:37 -06:00
|
|
|
static const struct nop {
|
2006-03-23 03:59:32 -07:00
|
|
|
int cpuid;
|
2007-10-17 10:04:37 -06:00
|
|
|
const unsigned char *const *noptable;
|
2006-03-23 03:59:32 -07:00
|
|
|
} noptypes[] = {
|
|
|
|
{ X86_FEATURE_K8, k8_nops },
|
|
|
|
{ X86_FEATURE_K7, k7_nops },
|
2007-10-17 10:04:41 -06:00
|
|
|
{ X86_FEATURE_P4, p6_nops },
|
|
|
|
{ X86_FEATURE_P3, p6_nops },
|
2006-03-23 03:59:32 -07:00
|
|
|
{ -1, NULL }
|
|
|
|
};
|
|
|
|
|
2007-10-17 10:04:37 -06:00
|
|
|
static const unsigned char*const * find_nop_table(void)
|
2006-03-23 03:59:32 -07:00
|
|
|
{
|
2007-10-17 10:04:37 -06:00
|
|
|
const unsigned char *const *noptable = intel_nops;
|
2006-03-23 03:59:32 -07:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; noptypes[i].cpuid >= 0; i++) {
|
|
|
|
if (boot_cpu_has(noptypes[i].cpuid)) {
|
|
|
|
noptable = noptypes[i].noptable;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return noptable;
|
|
|
|
}
|
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
#endif /* CONFIG_X86_64 */
|
|
|
|
|
2007-08-10 14:31:03 -06:00
|
|
|
/* Use this to add nops to a buffer, then text_poke the whole buffer. */
|
2008-03-06 06:48:49 -07:00
|
|
|
void add_nops(void *insns, unsigned int len)
|
2006-12-06 18:14:08 -07:00
|
|
|
{
|
2007-10-17 10:04:37 -06:00
|
|
|
const unsigned char *const *noptable = find_nop_table();
|
2006-12-06 18:14:08 -07:00
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
unsigned int noplen = len;
|
|
|
|
if (noplen > ASM_NOP_MAX)
|
|
|
|
noplen = ASM_NOP_MAX;
|
2007-08-10 14:31:03 -06:00
|
|
|
memcpy(insns, noptable[noplen], noplen);
|
2006-12-06 18:14:08 -07:00
|
|
|
insns += noplen;
|
|
|
|
len -= noplen;
|
|
|
|
}
|
|
|
|
}
|
2008-03-06 06:48:49 -07:00
|
|
|
EXPORT_SYMBOL_GPL(add_nops);
|
2006-12-06 18:14:08 -07:00
|
|
|
|
2006-06-26 05:56:16 -06:00
|
|
|
extern struct alt_instr __alt_instructions[], __alt_instructions_end[];
|
|
|
|
extern u8 *__smp_locks[], *__smp_locks_end[];
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
/* Replace instructions with better alternatives for this CPU type.
|
|
|
|
This runs before SMP is initialized to avoid SMP problems with
|
|
|
|
self modifying code. This implies that assymetric systems where
|
|
|
|
APs have less capabilities than the boot processor are not handled.
|
|
|
|
Tough. Make sure you disable such features by hand. */
|
|
|
|
|
|
|
|
void apply_alternatives(struct alt_instr *start, struct alt_instr *end)
|
|
|
|
{
|
|
|
|
struct alt_instr *a;
|
2007-08-10 14:31:03 -06:00
|
|
|
char insnbuf[MAX_PATCH_LEN];
|
2006-03-23 03:59:32 -07:00
|
|
|
|
2008-03-03 12:37:23 -07:00
|
|
|
DPRINTK("%s: alt table %p -> %p\n", __func__, start, end);
|
2006-03-23 03:59:32 -07:00
|
|
|
for (a = start; a < end; a++) {
|
2007-08-10 14:31:03 -06:00
|
|
|
u8 *instr = a->instr;
|
2006-03-23 03:59:32 -07:00
|
|
|
BUG_ON(a->replacementlen > a->instrlen);
|
2007-08-10 14:31:03 -06:00
|
|
|
BUG_ON(a->instrlen > sizeof(insnbuf));
|
2006-03-23 03:59:32 -07:00
|
|
|
if (!boot_cpu_has(a->cpuid))
|
|
|
|
continue;
|
2006-06-26 05:56:16 -06:00
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
/* vsyscall code is not mapped yet. resolve it manually. */
|
|
|
|
if (instr >= (u8 *)VSYSCALL_START && instr < (u8*)VSYSCALL_END) {
|
|
|
|
instr = __va(instr - (u8*)VSYSCALL_START + (u8*)__pa_symbol(&__vsyscall_0));
|
|
|
|
DPRINTK("%s: vsyscall fixup: %p => %p\n",
|
2008-03-03 12:37:23 -07:00
|
|
|
__func__, a->instr, instr);
|
2006-06-26 05:56:16 -06:00
|
|
|
}
|
|
|
|
#endif
|
2007-08-10 14:31:03 -06:00
|
|
|
memcpy(insnbuf, a->replacement, a->replacementlen);
|
|
|
|
add_nops(insnbuf + a->replacementlen,
|
|
|
|
a->instrlen - a->replacementlen);
|
2008-03-06 06:48:49 -07:00
|
|
|
text_poke_early(instr, insnbuf, a->instrlen);
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-07-01 05:36:18 -06:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
static void alternatives_smp_lock(u8 **start, u8 **end, u8 *text, u8 *text_end)
|
|
|
|
{
|
|
|
|
u8 **ptr;
|
|
|
|
|
|
|
|
for (ptr = start; ptr < end; ptr++) {
|
|
|
|
if (*ptr < text)
|
|
|
|
continue;
|
|
|
|
if (*ptr > text_end)
|
|
|
|
continue;
|
2007-07-22 03:12:31 -06:00
|
|
|
text_poke(*ptr, ((unsigned char []){0xf0}), 1); /* add lock prefix */
|
2006-03-23 03:59:32 -07:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
static void alternatives_smp_unlock(u8 **start, u8 **end, u8 *text, u8 *text_end)
|
|
|
|
{
|
|
|
|
u8 **ptr;
|
2007-08-10 14:31:03 -06:00
|
|
|
char insn[1];
|
2006-03-23 03:59:32 -07:00
|
|
|
|
2007-05-02 11:27:13 -06:00
|
|
|
if (noreplace_smp)
|
|
|
|
return;
|
|
|
|
|
2007-08-10 14:31:03 -06:00
|
|
|
add_nops(insn, 1);
|
2006-03-23 03:59:32 -07:00
|
|
|
for (ptr = start; ptr < end; ptr++) {
|
|
|
|
if (*ptr < text)
|
|
|
|
continue;
|
|
|
|
if (*ptr > text_end)
|
|
|
|
continue;
|
2007-08-10 14:31:03 -06:00
|
|
|
text_poke(*ptr, insn, 1);
|
2006-03-23 03:59:32 -07:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
struct smp_alt_module {
|
|
|
|
/* what is this ??? */
|
|
|
|
struct module *mod;
|
|
|
|
char *name;
|
|
|
|
|
|
|
|
/* ptrs to lock prefixes */
|
|
|
|
u8 **locks;
|
|
|
|
u8 **locks_end;
|
|
|
|
|
|
|
|
/* .text segment, needed to avoid patching init code ;) */
|
|
|
|
u8 *text;
|
|
|
|
u8 *text_end;
|
|
|
|
|
|
|
|
struct list_head next;
|
|
|
|
};
|
|
|
|
static LIST_HEAD(smp_alt_modules);
|
|
|
|
static DEFINE_SPINLOCK(smp_alt);
|
2008-01-30 05:33:17 -07:00
|
|
|
static int smp_mode = 1; /* protected by smp_alt */
|
2006-03-23 03:59:32 -07:00
|
|
|
|
|
|
|
void alternatives_smp_module_add(struct module *mod, char *name,
|
|
|
|
void *locks, void *locks_end,
|
|
|
|
void *text, void *text_end)
|
|
|
|
{
|
|
|
|
struct smp_alt_module *smp;
|
|
|
|
|
2007-05-02 11:27:13 -06:00
|
|
|
if (noreplace_smp)
|
|
|
|
return;
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
if (smp_alt_once) {
|
|
|
|
if (boot_cpu_has(X86_FEATURE_UP))
|
|
|
|
alternatives_smp_unlock(locks, locks_end,
|
|
|
|
text, text_end);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
smp = kzalloc(sizeof(*smp), GFP_KERNEL);
|
|
|
|
if (NULL == smp)
|
|
|
|
return; /* we'll run the (safe but slow) SMP code then ... */
|
|
|
|
|
|
|
|
smp->mod = mod;
|
|
|
|
smp->name = name;
|
|
|
|
smp->locks = locks;
|
|
|
|
smp->locks_end = locks_end;
|
|
|
|
smp->text = text;
|
|
|
|
smp->text_end = text_end;
|
|
|
|
DPRINTK("%s: locks %p -> %p, text %p -> %p, name %s\n",
|
2008-03-03 12:37:23 -07:00
|
|
|
__func__, smp->locks, smp->locks_end,
|
2006-03-23 03:59:32 -07:00
|
|
|
smp->text, smp->text_end, smp->name);
|
|
|
|
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_lock(&smp_alt);
|
2006-03-23 03:59:32 -07:00
|
|
|
list_add_tail(&smp->next, &smp_alt_modules);
|
|
|
|
if (boot_cpu_has(X86_FEATURE_UP))
|
|
|
|
alternatives_smp_unlock(smp->locks, smp->locks_end,
|
|
|
|
smp->text, smp->text_end);
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_unlock(&smp_alt);
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void alternatives_smp_module_del(struct module *mod)
|
|
|
|
{
|
|
|
|
struct smp_alt_module *item;
|
|
|
|
|
2007-05-02 11:27:13 -06:00
|
|
|
if (smp_alt_once || noreplace_smp)
|
2006-03-23 03:59:32 -07:00
|
|
|
return;
|
|
|
|
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_lock(&smp_alt);
|
2006-03-23 03:59:32 -07:00
|
|
|
list_for_each_entry(item, &smp_alt_modules, next) {
|
|
|
|
if (mod != item->mod)
|
|
|
|
continue;
|
|
|
|
list_del(&item->next);
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_unlock(&smp_alt);
|
2008-03-03 12:37:23 -07:00
|
|
|
DPRINTK("%s: %s\n", __func__, item->name);
|
2006-03-23 03:59:32 -07:00
|
|
|
kfree(item);
|
|
|
|
return;
|
|
|
|
}
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_unlock(&smp_alt);
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void alternatives_smp_switch(int smp)
|
|
|
|
{
|
|
|
|
struct smp_alt_module *mod;
|
|
|
|
|
2006-07-03 01:24:57 -06:00
|
|
|
#ifdef CONFIG_LOCKDEP
|
|
|
|
/*
|
2008-01-30 05:33:24 -07:00
|
|
|
* Older binutils section handling bug prevented
|
|
|
|
* alternatives-replacement from working reliably.
|
|
|
|
*
|
|
|
|
* If this still occurs then you should see a hang
|
|
|
|
* or crash shortly after this line:
|
2006-07-03 01:24:57 -06:00
|
|
|
*/
|
2008-01-30 05:33:24 -07:00
|
|
|
printk("lockdep: fixing up alternatives.\n");
|
2006-07-03 01:24:57 -06:00
|
|
|
#endif
|
|
|
|
|
2007-05-02 11:27:13 -06:00
|
|
|
if (noreplace_smp || smp_alt_once)
|
2006-03-23 03:59:32 -07:00
|
|
|
return;
|
|
|
|
BUG_ON(!smp && (num_online_cpus() > 1));
|
|
|
|
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_lock(&smp_alt);
|
2008-01-30 05:33:17 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Avoid unnecessary switches because it forces JIT based VMs to
|
|
|
|
* throw away all cached translations, which can be quite costly.
|
|
|
|
*/
|
|
|
|
if (smp == smp_mode) {
|
|
|
|
/* nothing */
|
|
|
|
} else if (smp) {
|
2006-03-23 03:59:32 -07:00
|
|
|
printk(KERN_INFO "SMP alternatives: switching to SMP code\n");
|
2008-01-30 05:30:55 -07:00
|
|
|
clear_cpu_cap(&boot_cpu_data, X86_FEATURE_UP);
|
|
|
|
clear_cpu_cap(&cpu_data(0), X86_FEATURE_UP);
|
2006-03-23 03:59:32 -07:00
|
|
|
list_for_each_entry(mod, &smp_alt_modules, next)
|
|
|
|
alternatives_smp_lock(mod->locks, mod->locks_end,
|
|
|
|
mod->text, mod->text_end);
|
|
|
|
} else {
|
|
|
|
printk(KERN_INFO "SMP alternatives: switching to UP code\n");
|
2008-01-30 05:30:55 -07:00
|
|
|
set_cpu_cap(&boot_cpu_data, X86_FEATURE_UP);
|
|
|
|
set_cpu_cap(&cpu_data(0), X86_FEATURE_UP);
|
2006-03-23 03:59:32 -07:00
|
|
|
list_for_each_entry(mod, &smp_alt_modules, next)
|
|
|
|
alternatives_smp_unlock(mod->locks, mod->locks_end,
|
|
|
|
mod->text, mod->text_end);
|
|
|
|
}
|
2008-01-30 05:33:17 -07:00
|
|
|
smp_mode = smp;
|
2008-03-06 06:48:49 -07:00
|
|
|
spin_unlock(&smp_alt);
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
|
|
|
|
2006-07-01 05:36:18 -06:00
|
|
|
#endif
|
|
|
|
|
2006-12-06 18:14:08 -07:00
|
|
|
#ifdef CONFIG_PARAVIRT
|
2007-05-02 11:27:14 -06:00
|
|
|
void apply_paravirt(struct paravirt_patch_site *start,
|
|
|
|
struct paravirt_patch_site *end)
|
2006-12-06 18:14:08 -07:00
|
|
|
{
|
2007-05-02 11:27:14 -06:00
|
|
|
struct paravirt_patch_site *p;
|
2007-08-10 14:31:03 -06:00
|
|
|
char insnbuf[MAX_PATCH_LEN];
|
2006-12-06 18:14:08 -07:00
|
|
|
|
2007-05-02 11:27:16 -06:00
|
|
|
if (noreplace_paravirt)
|
|
|
|
return;
|
|
|
|
|
2006-12-06 18:14:08 -07:00
|
|
|
for (p = start; p < end; p++) {
|
|
|
|
unsigned int used;
|
|
|
|
|
2007-08-10 14:31:03 -06:00
|
|
|
BUG_ON(p->len > MAX_PATCH_LEN);
|
2007-08-18 15:31:41 -06:00
|
|
|
/* prep the buffer with the original instructions */
|
|
|
|
memcpy(insnbuf, p->instr, p->len);
|
2007-10-16 12:51:29 -06:00
|
|
|
used = pv_init_ops.patch(p->instrtype, p->clobbers, insnbuf,
|
|
|
|
(unsigned long)p->instr, p->len);
|
2007-05-02 11:27:13 -06:00
|
|
|
|
2007-05-02 11:27:14 -06:00
|
|
|
BUG_ON(used > p->len);
|
|
|
|
|
2006-12-06 18:14:08 -07:00
|
|
|
/* Pad the rest with nops */
|
2007-08-10 14:31:03 -06:00
|
|
|
add_nops(insnbuf + used, p->len - used);
|
2008-03-06 06:48:49 -07:00
|
|
|
text_poke_early(p->instr, insnbuf, p->len);
|
2006-12-06 18:14:08 -07:00
|
|
|
}
|
|
|
|
}
|
2007-05-02 11:27:14 -06:00
|
|
|
extern struct paravirt_patch_site __start_parainstructions[],
|
2006-12-06 18:14:08 -07:00
|
|
|
__stop_parainstructions[];
|
|
|
|
#endif /* CONFIG_PARAVIRT */
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
void __init alternative_instructions(void)
|
|
|
|
{
|
2007-07-22 03:12:32 -06:00
|
|
|
/* The patching is not fully atomic, so try to avoid local interruptions
|
|
|
|
that might execute the to be patched code.
|
|
|
|
Other CPUs are not running. */
|
|
|
|
stop_nmi();
|
2007-08-10 14:31:06 -06:00
|
|
|
#ifdef CONFIG_X86_MCE
|
2007-07-22 03:12:32 -06:00
|
|
|
stop_mce();
|
|
|
|
#endif
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
apply_alternatives(__alt_instructions, __alt_instructions_end);
|
|
|
|
|
|
|
|
/* switch to patch-once-at-boottime-only mode and free the
|
|
|
|
* tables in case we know the number of CPUs will never ever
|
|
|
|
* change */
|
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
|
|
|
if (num_possible_cpus() < 2)
|
|
|
|
smp_alt_once = 1;
|
|
|
|
#endif
|
|
|
|
|
2006-07-01 05:36:18 -06:00
|
|
|
#ifdef CONFIG_SMP
|
2006-03-23 03:59:32 -07:00
|
|
|
if (smp_alt_once) {
|
|
|
|
if (1 == num_possible_cpus()) {
|
|
|
|
printk(KERN_INFO "SMP alternatives: switching to UP code\n");
|
2008-01-30 05:30:55 -07:00
|
|
|
set_cpu_cap(&boot_cpu_data, X86_FEATURE_UP);
|
|
|
|
set_cpu_cap(&cpu_data(0), X86_FEATURE_UP);
|
|
|
|
|
2006-03-23 03:59:32 -07:00
|
|
|
alternatives_smp_unlock(__smp_locks, __smp_locks_end,
|
|
|
|
_text, _etext);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
alternatives_smp_module_add(NULL, "core kernel",
|
|
|
|
__smp_locks, __smp_locks_end,
|
|
|
|
_text, _etext);
|
2008-01-30 05:33:17 -07:00
|
|
|
|
|
|
|
/* Only switch to UP mode if we don't immediately boot others */
|
|
|
|
if (num_possible_cpus() == 1 || setup_max_cpus <= 1)
|
|
|
|
alternatives_smp_switch(0);
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
2006-07-01 05:36:18 -06:00
|
|
|
#endif
|
2007-05-02 11:27:16 -06:00
|
|
|
apply_paravirt(__parainstructions, __parainstructions_end);
|
2007-07-22 03:12:32 -06:00
|
|
|
|
2007-10-17 10:04:34 -06:00
|
|
|
if (smp_alt_once)
|
|
|
|
free_init_pages("SMP alternatives",
|
|
|
|
(unsigned long)__smp_locks,
|
|
|
|
(unsigned long)__smp_locks_end);
|
|
|
|
|
2007-07-22 03:12:32 -06:00
|
|
|
restart_nmi();
|
2007-08-10 14:31:06 -06:00
|
|
|
#ifdef CONFIG_X86_MCE
|
2007-07-22 03:12:32 -06:00
|
|
|
restart_mce();
|
|
|
|
#endif
|
2006-03-23 03:59:32 -07:00
|
|
|
}
|
2007-07-22 03:12:31 -06:00
|
|
|
|
2008-03-06 06:48:49 -07:00
|
|
|
/**
|
|
|
|
* text_poke_early - Update instructions on a live kernel at boot time
|
|
|
|
* @addr: address to modify
|
|
|
|
* @opcode: source of the copy
|
|
|
|
* @len: length to copy
|
|
|
|
*
|
2007-07-22 03:12:31 -06:00
|
|
|
* When you use this code to patch more than one byte of an instruction
|
|
|
|
* you need to make sure that other CPUs cannot execute this code in parallel.
|
2008-03-06 06:48:49 -07:00
|
|
|
* Also no thread must be currently preempted in the middle of these
|
|
|
|
* instructions. And on the local CPU you need to be protected again NMI or MCE
|
|
|
|
* handlers seeing an inconsistent instruction while you patch.
|
2007-07-22 03:12:31 -06:00
|
|
|
*/
|
2008-03-06 06:48:49 -07:00
|
|
|
void *text_poke_early(void *addr, const void *opcode, size_t len)
|
2007-07-22 03:12:31 -06:00
|
|
|
{
|
2008-03-06 06:48:49 -07:00
|
|
|
unsigned long flags;
|
|
|
|
local_irq_save(flags);
|
2007-07-22 03:12:31 -06:00
|
|
|
memcpy(addr, opcode, len);
|
2008-03-06 06:48:49 -07:00
|
|
|
local_irq_restore(flags);
|
|
|
|
sync_core();
|
|
|
|
/* Could also do a CLFLUSH here to speed up CPU recovery; but
|
|
|
|
that causes hangs on some VIA CPUs. */
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* text_poke - Update instructions on a live kernel
|
|
|
|
* @addr: address to modify
|
|
|
|
* @opcode: source of the copy
|
|
|
|
* @len: length to copy
|
|
|
|
*
|
|
|
|
* Only atomic text poke/set should be allowed when not doing early patching.
|
|
|
|
* It means the size must be writable atomically and the address must be aligned
|
|
|
|
* in a way that permits an atomic write. It also makes sure we fit on a single
|
|
|
|
* page.
|
|
|
|
*/
|
|
|
|
void *__kprobes text_poke(void *addr, const void *opcode, size_t len)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
char *vaddr;
|
|
|
|
int nr_pages = 2;
|
|
|
|
|
|
|
|
BUG_ON(len > sizeof(long));
|
|
|
|
BUG_ON((((long)addr + len - 1) & ~(sizeof(long) - 1))
|
|
|
|
- ((long)addr & ~(sizeof(long) - 1)));
|
x86: fix test_poke for vmalloced pages
* Ingo Molnar (mingo@elte.hu) wrote:
>
> * Mathieu Desnoyers <mathieu.desnoyers@polymtl.ca> wrote:
>
> > The shadow vmap for DEBUG_RODATA kernel text modification uses
> > virt_to_page to get the pages from the pointer address.
> >
> > However, I think vmalloc_to_page would be required in case the page is
> > used for modules.
> >
> > Since only the core kernel text is marked read-only, use
> > kernel_text_address() to make sure we only shadow map the core kernel
> > text, not modules.
>
> actually, i think we should mark module text readonly too.
>
Yes, but in the meantime, the x86 tree would need this patch to make
kprobes work correctly on modules.
I suspect that without this fix, with the enhanced hotplug and kprobes
patch, kprobes will use text_poke to insert breakpoints in modules
(vmalloced pages used), which will map the wrong pages and corrupt
random kernel locations instead of updating the correct page.
Work that would write protect the module pages should clearly be done,
but it can come in a later time. We have to make sure we interact
correctly with the page allocation debugging, as an example.
Here is the patch against x86.git 2.6.25-rc5 :
The shadow vmap for DEBUG_RODATA kernel text modification uses virt_to_page to
get the pages from the pointer address.
However, I think vmalloc_to_page would be required in case the page is used for
modules.
Since only the core kernel text is marked read-only, use kernel_text_address()
to make sure we only shadow map the core kernel text, not modules.
Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@polymtl.ca>
CC: akpm@linux-foundation.org
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-03-12 09:54:16 -06:00
|
|
|
if (kernel_text_address((unsigned long)addr)) {
|
2008-03-06 06:48:49 -07:00
|
|
|
struct page *pages[2] = { virt_to_page(addr),
|
|
|
|
virt_to_page(addr + PAGE_SIZE) };
|
|
|
|
if (!pages[1])
|
|
|
|
nr_pages = 1;
|
|
|
|
vaddr = vmap(pages, nr_pages, VM_MAP, PAGE_KERNEL);
|
|
|
|
BUG_ON(!vaddr);
|
|
|
|
local_irq_save(flags);
|
|
|
|
memcpy(&vaddr[(unsigned long)addr & ~PAGE_MASK], opcode, len);
|
|
|
|
local_irq_restore(flags);
|
|
|
|
vunmap(vaddr);
|
x86: fix test_poke for vmalloced pages
* Ingo Molnar (mingo@elte.hu) wrote:
>
> * Mathieu Desnoyers <mathieu.desnoyers@polymtl.ca> wrote:
>
> > The shadow vmap for DEBUG_RODATA kernel text modification uses
> > virt_to_page to get the pages from the pointer address.
> >
> > However, I think vmalloc_to_page would be required in case the page is
> > used for modules.
> >
> > Since only the core kernel text is marked read-only, use
> > kernel_text_address() to make sure we only shadow map the core kernel
> > text, not modules.
>
> actually, i think we should mark module text readonly too.
>
Yes, but in the meantime, the x86 tree would need this patch to make
kprobes work correctly on modules.
I suspect that without this fix, with the enhanced hotplug and kprobes
patch, kprobes will use text_poke to insert breakpoints in modules
(vmalloced pages used), which will map the wrong pages and corrupt
random kernel locations instead of updating the correct page.
Work that would write protect the module pages should clearly be done,
but it can come in a later time. We have to make sure we interact
correctly with the page allocation debugging, as an example.
Here is the patch against x86.git 2.6.25-rc5 :
The shadow vmap for DEBUG_RODATA kernel text modification uses virt_to_page to
get the pages from the pointer address.
However, I think vmalloc_to_page would be required in case the page is used for
modules.
Since only the core kernel text is marked read-only, use kernel_text_address()
to make sure we only shadow map the core kernel text, not modules.
Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@polymtl.ca>
CC: akpm@linux-foundation.org
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-03-12 09:54:16 -06:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* modules are in vmalloc'ed memory, always writable.
|
|
|
|
*/
|
|
|
|
local_irq_save(flags);
|
|
|
|
memcpy(addr, opcode, len);
|
|
|
|
local_irq_restore(flags);
|
2008-03-06 06:48:49 -07:00
|
|
|
}
|
2007-07-22 03:12:31 -06:00
|
|
|
sync_core();
|
2007-09-06 08:59:52 -06:00
|
|
|
/* Could also do a CLFLUSH here to speed up CPU recovery; but
|
|
|
|
that causes hangs on some VIA CPUs. */
|
2008-03-06 06:48:49 -07:00
|
|
|
return addr;
|
2007-07-22 03:12:31 -06:00
|
|
|
}
|