x86_64, ftrace: Make ftrace use kernel identity mapping to modify code
On x86_64, kernel text mappings are mapped read-only with CONFIG_DEBUG_RODATA. So use the kernel identity mapping instead of the kernel text mapping to modify the kernel text. Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com> Acked-by: Steven Rostedt <rostedt@goodmis.org> Tested-by: Steven Rostedt <rostedt@goodmis.org> LKML-Reference: <20091029024821.080941108@sbs-t61.sc.intel.com> Signed-off-by: Ingo Molnar <mingo@elte.hu>
This commit is contained in:
committed by
Ingo Molnar
parent
502f660466
commit
55ca3cc174
@@ -187,9 +187,26 @@ static void wait_for_nmi(void)
|
|||||||
nmi_wait_count++;
|
nmi_wait_count++;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline int
|
||||||
|
within(unsigned long addr, unsigned long start, unsigned long end)
|
||||||
|
{
|
||||||
|
return addr >= start && addr < end;
|
||||||
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
do_ftrace_mod_code(unsigned long ip, void *new_code)
|
do_ftrace_mod_code(unsigned long ip, void *new_code)
|
||||||
{
|
{
|
||||||
|
/*
|
||||||
|
* On x86_64, kernel text mappings are mapped read-only with
|
||||||
|
* CONFIG_DEBUG_RODATA. So we use the kernel identity mapping instead
|
||||||
|
* of the kernel text mapping to modify the kernel text.
|
||||||
|
*
|
||||||
|
* For 32bit kernels, these mappings are same and we can use
|
||||||
|
* kernel identity mapping to modify code.
|
||||||
|
*/
|
||||||
|
if (within(ip, (unsigned long)_text, (unsigned long)_etext))
|
||||||
|
ip = (unsigned long)__va(__pa(ip));
|
||||||
|
|
||||||
mod_code_ip = (void *)ip;
|
mod_code_ip = (void *)ip;
|
||||||
mod_code_newcode = new_code;
|
mod_code_newcode = new_code;
|
||||||
|
|
||||||
|
@@ -279,8 +279,7 @@ static inline pgprot_t static_protections(pgprot_t prot, unsigned long address,
|
|||||||
__pa((unsigned long)__end_rodata) >> PAGE_SHIFT))
|
__pa((unsigned long)__end_rodata) >> PAGE_SHIFT))
|
||||||
pgprot_val(forbidden) |= _PAGE_RW;
|
pgprot_val(forbidden) |= _PAGE_RW;
|
||||||
|
|
||||||
#if defined(CONFIG_X86_64) && defined(CONFIG_DEBUG_RODATA) && \
|
#if defined(CONFIG_X86_64) && defined(CONFIG_DEBUG_RODATA)
|
||||||
!defined(CONFIG_DYNAMIC_FTRACE)
|
|
||||||
/*
|
/*
|
||||||
* Once the kernel maps the text as RO (kernel_set_to_readonly is set),
|
* Once the kernel maps the text as RO (kernel_set_to_readonly is set),
|
||||||
* kernel text mappings for the large page aligned text, rodata sections
|
* kernel text mappings for the large page aligned text, rodata sections
|
||||||
|
Reference in New Issue
Block a user