| 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
| 2 | /* |
| 3 | * Copyright 2008 Michael Ellerman, IBM Corporation. |
| 4 | */ |
| 5 | |
| 6 | #include <linux/kprobes.h> |
| 7 | #include <linux/mmu_context.h> |
| 8 | #include <linux/random.h> |
| 9 | #include <linux/vmalloc.h> |
| 10 | #include <linux/init.h> |
| 11 | #include <linux/cpuhotplug.h> |
| 12 | #include <linux/uaccess.h> |
| 13 | #include <linux/jump_label.h> |
| 14 | |
| 15 | #include <asm/debug.h> |
| 16 | #include <asm/pgalloc.h> |
| 17 | #include <asm/tlb.h> |
| 18 | #include <asm/tlbflush.h> |
| 19 | #include <asm/page.h> |
| 20 | #include <asm/text-patching.h> |
| 21 | #include <asm/inst.h> |
| 22 | |
| 23 | static int __patch_mem(void *exec_addr, unsigned long val, void *patch_addr, bool is_dword) |
| 24 | { |
| 25 | if (!IS_ENABLED(CONFIG_PPC64) || likely(!is_dword)) { |
| 26 | /* For big endian correctness: plain address would use the wrong half */ |
| 27 | u32 val32 = val; |
| 28 | |
| 29 | __put_kernel_nofault(patch_addr, &val32, u32, failed); |
| 30 | } else { |
| 31 | __put_kernel_nofault(patch_addr, &val, u64, failed); |
| 32 | } |
| 33 | |
| 34 | asm ("dcbst 0, %0; sync; icbi 0,%1; sync; isync" :: "r" (patch_addr), |
| 35 | "r" (exec_addr)); |
| 36 | |
| 37 | return 0; |
| 38 | |
| 39 | failed: |
| 40 | mb(); /* sync */ |
| 41 | return -EPERM; |
| 42 | } |
| 43 | |
| 44 | int raw_patch_instruction(u32 *addr, ppc_inst_t instr) |
| 45 | { |
| 46 | if (ppc_inst_prefixed(instr)) |
| 47 | return __patch_mem(addr, ppc_inst_as_ulong(instr), addr, true); |
| 48 | else |
| 49 | return __patch_mem(addr, ppc_inst_val(instr), addr, false); |
| 50 | } |
| 51 | |
| 52 | struct patch_context { |
| 53 | union { |
| 54 | struct vm_struct *area; |
| 55 | struct mm_struct *mm; |
| 56 | }; |
| 57 | unsigned long addr; |
| 58 | pte_t *pte; |
| 59 | }; |
| 60 | |
| 61 | static DEFINE_PER_CPU(struct patch_context, cpu_patching_context); |
| 62 | |
| 63 | static int map_patch_area(void *addr, unsigned long text_poke_addr); |
| 64 | static void unmap_patch_area(unsigned long addr); |
| 65 | |
| 66 | static bool mm_patch_enabled(void) |
| 67 | { |
| 68 | return IS_ENABLED(CONFIG_SMP) && radix_enabled(); |
| 69 | } |
| 70 | |
| 71 | /* |
| 72 | * The following applies for Radix MMU. Hash MMU has different requirements, |
| 73 | * and so is not supported. |
| 74 | * |
| 75 | * Changing mm requires context synchronising instructions on both sides of |
| 76 | * the context switch, as well as a hwsync between the last instruction for |
| 77 | * which the address of an associated storage access was translated using |
| 78 | * the current context. |
| 79 | * |
| 80 | * switch_mm_irqs_off() performs an isync after the context switch. It is |
| 81 | * the responsibility of the caller to perform the CSI and hwsync before |
| 82 | * starting/stopping the temp mm. |
| 83 | */ |
| 84 | static struct mm_struct *start_using_temp_mm(struct mm_struct *temp_mm) |
| 85 | { |
| 86 | struct mm_struct *orig_mm = current->active_mm; |
| 87 | |
| 88 | lockdep_assert_irqs_disabled(); |
| 89 | switch_mm_irqs_off(orig_mm, temp_mm, current); |
| 90 | |
| 91 | WARN_ON(!mm_is_thread_local(temp_mm)); |
| 92 | |
| 93 | suspend_breakpoints(); |
| 94 | return orig_mm; |
| 95 | } |
| 96 | |
| 97 | static void stop_using_temp_mm(struct mm_struct *temp_mm, |
| 98 | struct mm_struct *orig_mm) |
| 99 | { |
| 100 | lockdep_assert_irqs_disabled(); |
| 101 | switch_mm_irqs_off(temp_mm, orig_mm, current); |
| 102 | restore_breakpoints(); |
| 103 | } |
| 104 | |
| 105 | static int text_area_cpu_up(unsigned int cpu) |
| 106 | { |
| 107 | struct vm_struct *area; |
| 108 | unsigned long addr; |
| 109 | int err; |
| 110 | |
| 111 | area = get_vm_area(PAGE_SIZE, 0); |
| 112 | if (!area) { |
| 113 | WARN_ONCE(1, "Failed to create text area for cpu %d\n", |
| 114 | cpu); |
| 115 | return -1; |
| 116 | } |
| 117 | |
| 118 | // Map/unmap the area to ensure all page tables are pre-allocated |
| 119 | addr = (unsigned long)area->addr; |
| 120 | err = map_patch_area(empty_zero_page, addr); |
| 121 | if (err) |
| 122 | return err; |
| 123 | |
| 124 | unmap_patch_area(addr); |
| 125 | |
| 126 | this_cpu_write(cpu_patching_context.area, area); |
| 127 | this_cpu_write(cpu_patching_context.addr, addr); |
| 128 | this_cpu_write(cpu_patching_context.pte, virt_to_kpte(addr)); |
| 129 | |
| 130 | return 0; |
| 131 | } |
| 132 | |
| 133 | static int text_area_cpu_down(unsigned int cpu) |
| 134 | { |
| 135 | free_vm_area(this_cpu_read(cpu_patching_context.area)); |
| 136 | this_cpu_write(cpu_patching_context.area, NULL); |
| 137 | this_cpu_write(cpu_patching_context.addr, 0); |
| 138 | this_cpu_write(cpu_patching_context.pte, NULL); |
| 139 | return 0; |
| 140 | } |
| 141 | |
| 142 | static void put_patching_mm(struct mm_struct *mm, unsigned long patching_addr) |
| 143 | { |
| 144 | struct mmu_gather tlb; |
| 145 | |
| 146 | tlb_gather_mmu(&tlb, mm); |
| 147 | free_pgd_range(&tlb, patching_addr, patching_addr + PAGE_SIZE, 0, 0); |
| 148 | mmput(mm); |
| 149 | } |
| 150 | |
| 151 | static int text_area_cpu_up_mm(unsigned int cpu) |
| 152 | { |
| 153 | struct mm_struct *mm; |
| 154 | unsigned long addr; |
| 155 | pte_t *pte; |
| 156 | spinlock_t *ptl; |
| 157 | |
| 158 | mm = mm_alloc(); |
| 159 | if (WARN_ON(!mm)) |
| 160 | goto fail_no_mm; |
| 161 | |
| 162 | /* |
| 163 | * Choose a random page-aligned address from the interval |
| 164 | * [PAGE_SIZE .. DEFAULT_MAP_WINDOW - PAGE_SIZE]. |
| 165 | * The lower address bound is PAGE_SIZE to avoid the zero-page. |
| 166 | */ |
| 167 | addr = (1 + (get_random_long() % (DEFAULT_MAP_WINDOW / PAGE_SIZE - 2))) << PAGE_SHIFT; |
| 168 | |
| 169 | /* |
| 170 | * PTE allocation uses GFP_KERNEL which means we need to |
| 171 | * pre-allocate the PTE here because we cannot do the |
| 172 | * allocation during patching when IRQs are disabled. |
| 173 | * |
| 174 | * Using get_locked_pte() to avoid open coding, the lock |
| 175 | * is unnecessary. |
| 176 | */ |
| 177 | pte = get_locked_pte(mm, addr, &ptl); |
| 178 | if (!pte) |
| 179 | goto fail_no_pte; |
| 180 | pte_unmap_unlock(pte, ptl); |
| 181 | |
| 182 | this_cpu_write(cpu_patching_context.mm, mm); |
| 183 | this_cpu_write(cpu_patching_context.addr, addr); |
| 184 | |
| 185 | return 0; |
| 186 | |
| 187 | fail_no_pte: |
| 188 | put_patching_mm(mm, addr); |
| 189 | fail_no_mm: |
| 190 | return -ENOMEM; |
| 191 | } |
| 192 | |
| 193 | static int text_area_cpu_down_mm(unsigned int cpu) |
| 194 | { |
| 195 | put_patching_mm(this_cpu_read(cpu_patching_context.mm), |
| 196 | this_cpu_read(cpu_patching_context.addr)); |
| 197 | |
| 198 | this_cpu_write(cpu_patching_context.mm, NULL); |
| 199 | this_cpu_write(cpu_patching_context.addr, 0); |
| 200 | |
| 201 | return 0; |
| 202 | } |
| 203 | |
| 204 | static __ro_after_init DEFINE_STATIC_KEY_FALSE(poking_init_done); |
| 205 | |
| 206 | void __init poking_init(void) |
| 207 | { |
| 208 | int ret; |
| 209 | |
| 210 | if (mm_patch_enabled()) |
| 211 | ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, |
| 212 | "powerpc/text_poke_mm:online", |
| 213 | text_area_cpu_up_mm, |
| 214 | text_area_cpu_down_mm); |
| 215 | else |
| 216 | ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, |
| 217 | "powerpc/text_poke:online", |
| 218 | text_area_cpu_up, |
| 219 | text_area_cpu_down); |
| 220 | |
| 221 | /* cpuhp_setup_state returns >= 0 on success */ |
| 222 | if (WARN_ON(ret < 0)) |
| 223 | return; |
| 224 | |
| 225 | static_branch_enable(&poking_init_done); |
| 226 | } |
| 227 | |
| 228 | static unsigned long get_patch_pfn(void *addr) |
| 229 | { |
| 230 | if (IS_ENABLED(CONFIG_EXECMEM) && is_vmalloc_or_module_addr(addr)) |
| 231 | return vmalloc_to_pfn(addr); |
| 232 | else |
| 233 | return __pa_symbol(addr) >> PAGE_SHIFT; |
| 234 | } |
| 235 | |
| 236 | /* |
| 237 | * This can be called for kernel text or a module. |
| 238 | */ |
| 239 | static int map_patch_area(void *addr, unsigned long text_poke_addr) |
| 240 | { |
| 241 | unsigned long pfn = get_patch_pfn(addr); |
| 242 | |
| 243 | return map_kernel_page(text_poke_addr, (pfn << PAGE_SHIFT), PAGE_KERNEL); |
| 244 | } |
| 245 | |
| 246 | static void unmap_patch_area(unsigned long addr) |
| 247 | { |
| 248 | pte_t *ptep; |
| 249 | pmd_t *pmdp; |
| 250 | pud_t *pudp; |
| 251 | p4d_t *p4dp; |
| 252 | pgd_t *pgdp; |
| 253 | |
| 254 | pgdp = pgd_offset_k(addr); |
| 255 | if (WARN_ON(pgd_none(*pgdp))) |
| 256 | return; |
| 257 | |
| 258 | p4dp = p4d_offset(pgdp, addr); |
| 259 | if (WARN_ON(p4d_none(*p4dp))) |
| 260 | return; |
| 261 | |
| 262 | pudp = pud_offset(p4dp, addr); |
| 263 | if (WARN_ON(pud_none(*pudp))) |
| 264 | return; |
| 265 | |
| 266 | pmdp = pmd_offset(pudp, addr); |
| 267 | if (WARN_ON(pmd_none(*pmdp))) |
| 268 | return; |
| 269 | |
| 270 | ptep = pte_offset_kernel(pmdp, addr); |
| 271 | if (WARN_ON(pte_none(*ptep))) |
| 272 | return; |
| 273 | |
| 274 | /* |
| 275 | * In hash, pte_clear flushes the tlb, in radix, we have to |
| 276 | */ |
| 277 | pte_clear(&init_mm, addr, ptep); |
| 278 | flush_tlb_kernel_range(addr, addr + PAGE_SIZE); |
| 279 | } |
| 280 | |
| 281 | static int __do_patch_mem_mm(void *addr, unsigned long val, bool is_dword) |
| 282 | { |
| 283 | int err; |
| 284 | u32 *patch_addr; |
| 285 | unsigned long text_poke_addr; |
| 286 | pte_t *pte; |
| 287 | unsigned long pfn = get_patch_pfn(addr); |
| 288 | struct mm_struct *patching_mm; |
| 289 | struct mm_struct *orig_mm; |
| 290 | spinlock_t *ptl; |
| 291 | |
| 292 | patching_mm = __this_cpu_read(cpu_patching_context.mm); |
| 293 | text_poke_addr = __this_cpu_read(cpu_patching_context.addr); |
| 294 | patch_addr = (u32 *)(text_poke_addr + offset_in_page(addr)); |
| 295 | |
| 296 | pte = get_locked_pte(patching_mm, text_poke_addr, &ptl); |
| 297 | if (!pte) |
| 298 | return -ENOMEM; |
| 299 | |
| 300 | __set_pte_at(patching_mm, text_poke_addr, pte, pfn_pte(pfn, PAGE_KERNEL), 0); |
| 301 | |
| 302 | /* order PTE update before use, also serves as the hwsync */ |
| 303 | asm volatile("ptesync": : :"memory"); |
| 304 | |
| 305 | /* order context switch after arbitrary prior code */ |
| 306 | isync(); |
| 307 | |
| 308 | orig_mm = start_using_temp_mm(patching_mm); |
| 309 | |
| 310 | err = __patch_mem(addr, val, patch_addr, is_dword); |
| 311 | |
| 312 | /* context synchronisation performed by __patch_instruction (isync or exception) */ |
| 313 | stop_using_temp_mm(patching_mm, orig_mm); |
| 314 | |
| 315 | pte_clear(patching_mm, text_poke_addr, pte); |
| 316 | /* |
| 317 | * ptesync to order PTE update before TLB invalidation done |
| 318 | * by radix__local_flush_tlb_page_psize (in _tlbiel_va) |
| 319 | */ |
| 320 | local_flush_tlb_page_psize(patching_mm, text_poke_addr, mmu_virtual_psize); |
| 321 | |
| 322 | pte_unmap_unlock(pte, ptl); |
| 323 | |
| 324 | return err; |
| 325 | } |
| 326 | |
| 327 | static int __do_patch_mem(void *addr, unsigned long val, bool is_dword) |
| 328 | { |
| 329 | int err; |
| 330 | u32 *patch_addr; |
| 331 | unsigned long text_poke_addr; |
| 332 | pte_t *pte; |
| 333 | unsigned long pfn = get_patch_pfn(addr); |
| 334 | |
| 335 | text_poke_addr = (unsigned long)__this_cpu_read(cpu_patching_context.addr) & PAGE_MASK; |
| 336 | patch_addr = (u32 *)(text_poke_addr + offset_in_page(addr)); |
| 337 | |
| 338 | pte = __this_cpu_read(cpu_patching_context.pte); |
| 339 | __set_pte_at(&init_mm, text_poke_addr, pte, pfn_pte(pfn, PAGE_KERNEL), 0); |
| 340 | /* See ptesync comment in radix__set_pte_at() */ |
| 341 | if (radix_enabled()) |
| 342 | asm volatile("ptesync": : :"memory"); |
| 343 | |
| 344 | err = __patch_mem(addr, val, patch_addr, is_dword); |
| 345 | |
| 346 | pte_clear(&init_mm, text_poke_addr, pte); |
| 347 | flush_tlb_kernel_range(text_poke_addr, text_poke_addr + PAGE_SIZE); |
| 348 | |
| 349 | return err; |
| 350 | } |
| 351 | |
| 352 | static int patch_mem(void *addr, unsigned long val, bool is_dword) |
| 353 | { |
| 354 | int err; |
| 355 | unsigned long flags; |
| 356 | |
| 357 | /* |
| 358 | * During early early boot patch_instruction is called |
| 359 | * when text_poke_area is not ready, but we still need |
| 360 | * to allow patching. We just do the plain old patching |
| 361 | */ |
| 362 | if (!IS_ENABLED(CONFIG_STRICT_KERNEL_RWX) || |
| 363 | !static_branch_likely(&poking_init_done)) |
| 364 | return __patch_mem(addr, val, addr, is_dword); |
| 365 | |
| 366 | local_irq_save(flags); |
| 367 | if (mm_patch_enabled()) |
| 368 | err = __do_patch_mem_mm(addr, val, is_dword); |
| 369 | else |
| 370 | err = __do_patch_mem(addr, val, is_dword); |
| 371 | local_irq_restore(flags); |
| 372 | |
| 373 | return err; |
| 374 | } |
| 375 | |
| 376 | #ifdef CONFIG_PPC64 |
| 377 | |
| 378 | int patch_instruction(u32 *addr, ppc_inst_t instr) |
| 379 | { |
| 380 | if (ppc_inst_prefixed(instr)) |
| 381 | return patch_mem(addr, ppc_inst_as_ulong(instr), true); |
| 382 | else |
| 383 | return patch_mem(addr, ppc_inst_val(instr), false); |
| 384 | } |
| 385 | NOKPROBE_SYMBOL(patch_instruction); |
| 386 | |
| 387 | int patch_uint(void *addr, unsigned int val) |
| 388 | { |
| 389 | if (!IS_ALIGNED((unsigned long)addr, sizeof(unsigned int))) |
| 390 | return -EINVAL; |
| 391 | |
| 392 | return patch_mem(addr, val, false); |
| 393 | } |
| 394 | NOKPROBE_SYMBOL(patch_uint); |
| 395 | |
| 396 | int patch_ulong(void *addr, unsigned long val) |
| 397 | { |
| 398 | if (!IS_ALIGNED((unsigned long)addr, sizeof(unsigned long))) |
| 399 | return -EINVAL; |
| 400 | |
| 401 | return patch_mem(addr, val, true); |
| 402 | } |
| 403 | NOKPROBE_SYMBOL(patch_ulong); |
| 404 | |
| 405 | #else |
| 406 | |
| 407 | int patch_instruction(u32 *addr, ppc_inst_t instr) |
| 408 | { |
| 409 | return patch_mem(addr, ppc_inst_val(instr), false); |
| 410 | } |
| 411 | NOKPROBE_SYMBOL(patch_instruction) |
| 412 | |
| 413 | #endif |
| 414 | |
| 415 | static int patch_memset64(u64 *addr, u64 val, size_t count) |
| 416 | { |
| 417 | for (u64 *end = addr + count; addr < end; addr++) |
| 418 | __put_kernel_nofault(addr, &val, u64, failed); |
| 419 | |
| 420 | return 0; |
| 421 | |
| 422 | failed: |
| 423 | return -EPERM; |
| 424 | } |
| 425 | |
| 426 | static int patch_memset32(u32 *addr, u32 val, size_t count) |
| 427 | { |
| 428 | for (u32 *end = addr + count; addr < end; addr++) |
| 429 | __put_kernel_nofault(addr, &val, u32, failed); |
| 430 | |
| 431 | return 0; |
| 432 | |
| 433 | failed: |
| 434 | return -EPERM; |
| 435 | } |
| 436 | |
| 437 | static int __patch_instructions(u32 *patch_addr, u32 *code, size_t len, bool repeat_instr) |
| 438 | { |
| 439 | unsigned long start = (unsigned long)patch_addr; |
| 440 | int err; |
| 441 | |
| 442 | /* Repeat instruction */ |
| 443 | if (repeat_instr) { |
| 444 | ppc_inst_t instr = ppc_inst_read(code); |
| 445 | |
| 446 | if (ppc_inst_prefixed(instr)) { |
| 447 | u64 val = ppc_inst_as_ulong(instr); |
| 448 | |
| 449 | err = patch_memset64((u64 *)patch_addr, val, len / 8); |
| 450 | } else { |
| 451 | u32 val = ppc_inst_val(instr); |
| 452 | |
| 453 | err = patch_memset32(patch_addr, val, len / 4); |
| 454 | } |
| 455 | } else { |
| 456 | err = copy_to_kernel_nofault(patch_addr, code, len); |
| 457 | } |
| 458 | |
| 459 | smp_wmb(); /* smp write barrier */ |
| 460 | flush_icache_range(start, start + len); |
| 461 | return err; |
| 462 | } |
| 463 | |
| 464 | /* |
| 465 | * A page is mapped and instructions that fit the page are patched. |
| 466 | * Assumes 'len' to be (PAGE_SIZE - offset_in_page(addr)) or below. |
| 467 | */ |
| 468 | static int __do_patch_instructions_mm(u32 *addr, u32 *code, size_t len, bool repeat_instr) |
| 469 | { |
| 470 | struct mm_struct *patching_mm, *orig_mm; |
| 471 | unsigned long pfn = get_patch_pfn(addr); |
| 472 | unsigned long text_poke_addr; |
| 473 | spinlock_t *ptl; |
| 474 | u32 *patch_addr; |
| 475 | pte_t *pte; |
| 476 | int err; |
| 477 | |
| 478 | patching_mm = __this_cpu_read(cpu_patching_context.mm); |
| 479 | text_poke_addr = __this_cpu_read(cpu_patching_context.addr); |
| 480 | patch_addr = (u32 *)(text_poke_addr + offset_in_page(addr)); |
| 481 | |
| 482 | pte = get_locked_pte(patching_mm, text_poke_addr, &ptl); |
| 483 | if (!pte) |
| 484 | return -ENOMEM; |
| 485 | |
| 486 | __set_pte_at(patching_mm, text_poke_addr, pte, pfn_pte(pfn, PAGE_KERNEL), 0); |
| 487 | |
| 488 | /* order PTE update before use, also serves as the hwsync */ |
| 489 | asm volatile("ptesync" ::: "memory"); |
| 490 | |
| 491 | /* order context switch after arbitrary prior code */ |
| 492 | isync(); |
| 493 | |
| 494 | orig_mm = start_using_temp_mm(patching_mm); |
| 495 | |
| 496 | kasan_disable_current(); |
| 497 | err = __patch_instructions(patch_addr, code, len, repeat_instr); |
| 498 | kasan_enable_current(); |
| 499 | |
| 500 | /* context synchronisation performed by __patch_instructions */ |
| 501 | stop_using_temp_mm(patching_mm, orig_mm); |
| 502 | |
| 503 | pte_clear(patching_mm, text_poke_addr, pte); |
| 504 | /* |
| 505 | * ptesync to order PTE update before TLB invalidation done |
| 506 | * by radix__local_flush_tlb_page_psize (in _tlbiel_va) |
| 507 | */ |
| 508 | local_flush_tlb_page_psize(patching_mm, text_poke_addr, mmu_virtual_psize); |
| 509 | |
| 510 | pte_unmap_unlock(pte, ptl); |
| 511 | |
| 512 | return err; |
| 513 | } |
| 514 | |
| 515 | /* |
| 516 | * A page is mapped and instructions that fit the page are patched. |
| 517 | * Assumes 'len' to be (PAGE_SIZE - offset_in_page(addr)) or below. |
| 518 | */ |
| 519 | static int __do_patch_instructions(u32 *addr, u32 *code, size_t len, bool repeat_instr) |
| 520 | { |
| 521 | unsigned long pfn = get_patch_pfn(addr); |
| 522 | unsigned long text_poke_addr; |
| 523 | u32 *patch_addr; |
| 524 | pte_t *pte; |
| 525 | int err; |
| 526 | |
| 527 | text_poke_addr = (unsigned long)__this_cpu_read(cpu_patching_context.addr) & PAGE_MASK; |
| 528 | patch_addr = (u32 *)(text_poke_addr + offset_in_page(addr)); |
| 529 | |
| 530 | pte = __this_cpu_read(cpu_patching_context.pte); |
| 531 | __set_pte_at(&init_mm, text_poke_addr, pte, pfn_pte(pfn, PAGE_KERNEL), 0); |
| 532 | /* See ptesync comment in radix__set_pte_at() */ |
| 533 | if (radix_enabled()) |
| 534 | asm volatile("ptesync" ::: "memory"); |
| 535 | |
| 536 | err = __patch_instructions(patch_addr, code, len, repeat_instr); |
| 537 | |
| 538 | pte_clear(&init_mm, text_poke_addr, pte); |
| 539 | flush_tlb_kernel_range(text_poke_addr, text_poke_addr + PAGE_SIZE); |
| 540 | |
| 541 | return err; |
| 542 | } |
| 543 | |
| 544 | /* |
| 545 | * Patch 'addr' with 'len' bytes of instructions from 'code'. |
| 546 | * |
| 547 | * If repeat_instr is true, the same instruction is filled for |
| 548 | * 'len' bytes. |
| 549 | */ |
| 550 | int patch_instructions(u32 *addr, u32 *code, size_t len, bool repeat_instr) |
| 551 | { |
| 552 | while (len > 0) { |
| 553 | unsigned long flags; |
| 554 | size_t plen; |
| 555 | int err; |
| 556 | |
| 557 | plen = min_t(size_t, PAGE_SIZE - offset_in_page(addr), len); |
| 558 | |
| 559 | local_irq_save(flags); |
| 560 | if (mm_patch_enabled()) |
| 561 | err = __do_patch_instructions_mm(addr, code, plen, repeat_instr); |
| 562 | else |
| 563 | err = __do_patch_instructions(addr, code, plen, repeat_instr); |
| 564 | local_irq_restore(flags); |
| 565 | if (err) |
| 566 | return err; |
| 567 | |
| 568 | len -= plen; |
| 569 | addr = (u32 *)((unsigned long)addr + plen); |
| 570 | if (!repeat_instr) |
| 571 | code = (u32 *)((unsigned long)code + plen); |
| 572 | } |
| 573 | |
| 574 | return 0; |
| 575 | } |
| 576 | NOKPROBE_SYMBOL(patch_instructions); |
| 577 | |
| 578 | int patch_branch(u32 *addr, unsigned long target, int flags) |
| 579 | { |
| 580 | ppc_inst_t instr; |
| 581 | |
| 582 | if (create_branch(&instr, addr, target, flags)) |
| 583 | return -ERANGE; |
| 584 | |
| 585 | return patch_instruction(addr, instr); |
| 586 | } |
| 587 | |
| 588 | /* |
| 589 | * Helper to check if a given instruction is a conditional branch |
| 590 | * Derived from the conditional checks in analyse_instr() |
| 591 | */ |
| 592 | bool is_conditional_branch(ppc_inst_t instr) |
| 593 | { |
| 594 | unsigned int opcode = ppc_inst_primary_opcode(instr); |
| 595 | |
| 596 | if (opcode == 16) /* bc, bca, bcl, bcla */ |
| 597 | return true; |
| 598 | if (opcode == 19) { |
| 599 | switch ((ppc_inst_val(instr) >> 1) & 0x3ff) { |
| 600 | case 16: /* bclr, bclrl */ |
| 601 | case 528: /* bcctr, bcctrl */ |
| 602 | case 560: /* bctar, bctarl */ |
| 603 | return true; |
| 604 | } |
| 605 | } |
| 606 | return false; |
| 607 | } |
| 608 | NOKPROBE_SYMBOL(is_conditional_branch); |
| 609 | |
| 610 | int create_cond_branch(ppc_inst_t *instr, const u32 *addr, |
| 611 | unsigned long target, int flags) |
| 612 | { |
| 613 | long offset; |
| 614 | |
| 615 | offset = target; |
| 616 | if (! (flags & BRANCH_ABSOLUTE)) |
| 617 | offset = offset - (unsigned long)addr; |
| 618 | |
| 619 | /* Check we can represent the target in the instruction format */ |
| 620 | if (!is_offset_in_cond_branch_range(offset)) |
| 621 | return 1; |
| 622 | |
| 623 | /* Mask out the flags and target, so they don't step on each other. */ |
| 624 | *instr = ppc_inst(0x40000000 | (flags & 0x3FF0003) | (offset & 0xFFFC)); |
| 625 | |
| 626 | return 0; |
| 627 | } |
| 628 | |
| 629 | int instr_is_relative_branch(ppc_inst_t instr) |
| 630 | { |
| 631 | if (ppc_inst_val(instr) & BRANCH_ABSOLUTE) |
| 632 | return 0; |
| 633 | |
| 634 | return instr_is_branch_iform(instr) || instr_is_branch_bform(instr); |
| 635 | } |
| 636 | |
| 637 | int instr_is_relative_link_branch(ppc_inst_t instr) |
| 638 | { |
| 639 | return instr_is_relative_branch(instr) && (ppc_inst_val(instr) & BRANCH_SET_LINK); |
| 640 | } |
| 641 | |
| 642 | static unsigned long branch_iform_target(const u32 *instr) |
| 643 | { |
| 644 | signed long imm; |
| 645 | |
| 646 | imm = ppc_inst_val(ppc_inst_read(instr)) & 0x3FFFFFC; |
| 647 | |
| 648 | /* If the top bit of the immediate value is set this is negative */ |
| 649 | if (imm & 0x2000000) |
| 650 | imm -= 0x4000000; |
| 651 | |
| 652 | if ((ppc_inst_val(ppc_inst_read(instr)) & BRANCH_ABSOLUTE) == 0) |
| 653 | imm += (unsigned long)instr; |
| 654 | |
| 655 | return (unsigned long)imm; |
| 656 | } |
| 657 | |
| 658 | static unsigned long branch_bform_target(const u32 *instr) |
| 659 | { |
| 660 | signed long imm; |
| 661 | |
| 662 | imm = ppc_inst_val(ppc_inst_read(instr)) & 0xFFFC; |
| 663 | |
| 664 | /* If the top bit of the immediate value is set this is negative */ |
| 665 | if (imm & 0x8000) |
| 666 | imm -= 0x10000; |
| 667 | |
| 668 | if ((ppc_inst_val(ppc_inst_read(instr)) & BRANCH_ABSOLUTE) == 0) |
| 669 | imm += (unsigned long)instr; |
| 670 | |
| 671 | return (unsigned long)imm; |
| 672 | } |
| 673 | |
| 674 | unsigned long branch_target(const u32 *instr) |
| 675 | { |
| 676 | if (instr_is_branch_iform(ppc_inst_read(instr))) |
| 677 | return branch_iform_target(instr); |
| 678 | else if (instr_is_branch_bform(ppc_inst_read(instr))) |
| 679 | return branch_bform_target(instr); |
| 680 | |
| 681 | return 0; |
| 682 | } |
| 683 | |
| 684 | int translate_branch(ppc_inst_t *instr, const u32 *dest, const u32 *src) |
| 685 | { |
| 686 | unsigned long target; |
| 687 | target = branch_target(src); |
| 688 | |
| 689 | if (instr_is_branch_iform(ppc_inst_read(src))) |
| 690 | return create_branch(instr, dest, target, |
| 691 | ppc_inst_val(ppc_inst_read(src))); |
| 692 | else if (instr_is_branch_bform(ppc_inst_read(src))) |
| 693 | return create_cond_branch(instr, dest, target, |
| 694 | ppc_inst_val(ppc_inst_read(src))); |
| 695 | |
| 696 | return 1; |
| 697 | } |