1. 26 6月, 2015 5 次提交
  2. 11 6月, 2015 1 次提交
  3. 04 6月, 2015 1 次提交
    • I
      x86/asm/entry: Move the arch/x86/syscalls/ definitions to arch/x86/entry/syscalls/ · 1f57d5d8
      Ingo Molnar 提交于
      The build time generated syscall definitions are entry code related, move
      them into the arch/x86/entry/ directory.
      
      Cc: Borislav Petkov <bp@alien8.de>
      Cc: H. Peter Anvin <hpa@zytor.com>
      Cc: Linus Torvalds <torvalds@linux-foundation.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Andy Lutomirski <luto@amacapital.net>
      Cc: Denys Vlasenko <dvlasenk@redhat.com>
      Cc: Brian Gerst <brgerst@gmail.com>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: linux-kernel@vger.kernel.org
      Signed-off-by: NIngo Molnar <mingo@kernel.org>
      1f57d5d8
  4. 29 5月, 2015 1 次提交
  5. 22 4月, 2015 7 次提交
  6. 17 4月, 2015 18 次提交
  7. 15 4月, 2015 3 次提交
  8. 13 4月, 2015 4 次提交
    • Q
      modpost: document the use of struct section_check. · e5d8f59a
      Quentin Casasnovas 提交于
      struct section_check is used as a generic way of describing what
      relocations are authorized/forbidden when running modpost.  This commit
      tries to describe how each field is used.
      Signed-off-by: NQuentin Casasnovas <quentin.casasnovas@oracle.com>
      Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> (Fixed "mist"ake)
      e5d8f59a
    • Q
      modpost: handle relocations mismatch in __ex_table. · 52dc0595
      Quentin Casasnovas 提交于
      __ex_table is a simple table section where each entry is a pair of
      addresses - the first address is an address which can fault in kernel
      space, and the second address points to where the kernel should jump to
      when handling that fault.  This is how copy_from_user() does not crash the
      kernel if userspace gives a borked pointer for example.
      
      If one of these addresses point to a non-executable section, something is
      seriously wrong since it either means the kernel will never fault from
      there or it will not be able to jump to there.  As both cases are serious
      enough, we simply error out in these cases so the build fails and the
      developper has to fix the issue.
      
      In case the section is executable, but it isn't referenced in our list of
      authorized sections to point to from __ex_table, we just dump a warning
      giving more information about it.  We do this in case the new section is
      executable but isn't supposed to be executed by the kernel.  This happened
      with .altinstr_replacement, which is executable but is only used to copy
      instructions from - we should never have our instruction pointer pointing
      in .altinstr_replacement.  Admitedly, a proper fix in that case would be to
      just set .altinstr_replacement NX, but we need to warn about future cases
      like this.
      Signed-off-by: NQuentin Casasnovas <quentin.casasnovas@oracle.com>
      Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> (added long casts)
      52dc0595
    • Q
      scripts: add check_extable.sh script. · c31e4b83
      Quentin Casasnovas 提交于
      This shell script can be used to sanity check the __ex_table section on an
      object file, making sure the relocations in there are pointing to valid
      executable sections.  If it finds some suspicious relocations, it'll use
      addr2line to try and dump where this is coming from.
      
      This works best with CONFIG_DEBUG_INFO.
      Signed-off-by: NQuentin Casasnovas <quentin.casasnovas@oracle.com>
      Signed-off-by: NRusty Russell <rusty@rustcorp.com.au>
      c31e4b83
    • Q