License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 14:07:57 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2025-02-07 14:48:50 +00:00
|
|
|
|
|
|
|
#include <linux/cpufeature.h>
|
2020-09-07 15:20:05 +00:00
|
|
|
#include <linux/set_memory.h>
|
2020-09-04 15:41:27 +00:00
|
|
|
#include <linux/ptdump.h>
|
2012-10-04 12:46:12 +00:00
|
|
|
#include <linux/seq_file.h>
|
|
|
|
#include <linux/debugfs.h>
|
2024-07-23 18:49:55 +00:00
|
|
|
#include <linux/sort.h>
|
2012-10-04 12:46:12 +00:00
|
|
|
#include <linux/mm.h>
|
2021-07-28 19:02:54 +00:00
|
|
|
#include <linux/kfence.h>
|
2017-11-17 16:59:53 +00:00
|
|
|
#include <linux/kasan.h>
|
2017-11-17 16:40:16 +00:00
|
|
|
#include <asm/kasan.h>
|
2022-07-20 06:32:13 +00:00
|
|
|
#include <asm/abs_lowcore.h>
|
2021-04-07 07:20:17 +00:00
|
|
|
#include <asm/nospec-branch.h>
|
2012-10-04 12:46:12 +00:00
|
|
|
#include <asm/sections.h>
|
2022-09-04 08:32:32 +00:00
|
|
|
#include <asm/maccess.h>
|
2012-10-04 12:46:12 +00:00
|
|
|
|
|
|
|
static unsigned long max_addr;
|
|
|
|
|
|
|
|
struct addr_marker {
|
2024-07-23 18:49:55 +00:00
|
|
|
int is_start;
|
2012-10-04 12:46:12 +00:00
|
|
|
unsigned long start_address;
|
2024-07-29 15:09:40 +00:00
|
|
|
unsigned long size;
|
2012-10-04 12:46:12 +00:00
|
|
|
const char *name;
|
|
|
|
};
|
|
|
|
|
2024-07-29 15:09:40 +00:00
|
|
|
static struct addr_marker *markers;
|
|
|
|
static unsigned int markers_cnt;
|
2012-10-04 12:46:12 +00:00
|
|
|
|
|
|
|
struct pg_state {
|
2020-09-04 15:41:27 +00:00
|
|
|
struct ptdump_state ptdump;
|
|
|
|
struct seq_file *seq;
|
2012-10-04 12:46:12 +00:00
|
|
|
int level;
|
|
|
|
unsigned int current_prot;
|
2020-09-09 15:10:29 +00:00
|
|
|
bool check_wx;
|
|
|
|
unsigned long wx_pages;
|
2012-10-04 12:46:12 +00:00
|
|
|
unsigned long start_address;
|
|
|
|
const struct addr_marker *marker;
|
|
|
|
};
|
|
|
|
|
2020-09-09 09:14:52 +00:00
|
|
|
#define pt_dump_seq_printf(m, fmt, args...) \
|
|
|
|
({ \
|
|
|
|
struct seq_file *__m = (m); \
|
|
|
|
\
|
|
|
|
if (__m) \
|
|
|
|
seq_printf(__m, fmt, ##args); \
|
|
|
|
})
|
|
|
|
|
|
|
|
#define pt_dump_seq_puts(m, fmt) \
|
|
|
|
({ \
|
|
|
|
struct seq_file *__m = (m); \
|
|
|
|
\
|
|
|
|
if (__m) \
|
|
|
|
seq_printf(__m, fmt); \
|
|
|
|
})
|
|
|
|
|
2012-10-04 12:46:12 +00:00
|
|
|
static void print_prot(struct seq_file *m, unsigned int pr, int level)
|
|
|
|
{
|
|
|
|
static const char * const level_name[] =
|
|
|
|
{ "ASCE", "PGD", "PUD", "PMD", "PTE" };
|
|
|
|
|
2020-09-09 09:14:52 +00:00
|
|
|
pt_dump_seq_printf(m, "%s ", level_name[level]);
|
2013-02-16 10:47:27 +00:00
|
|
|
if (pr & _PAGE_INVALID) {
|
2020-09-09 09:14:52 +00:00
|
|
|
pt_dump_seq_printf(m, "I\n");
|
2013-02-16 10:47:27 +00:00
|
|
|
return;
|
|
|
|
}
|
2020-09-09 09:14:52 +00:00
|
|
|
pt_dump_seq_puts(m, (pr & _PAGE_PROTECT) ? "RO " : "RW ");
|
|
|
|
pt_dump_seq_puts(m, (pr & _PAGE_NOEXEC) ? "NX\n" : "X\n");
|
2012-10-04 12:46:12 +00:00
|
|
|
}
|
|
|
|
|
2020-09-09 15:10:29 +00:00
|
|
|
static void note_prot_wx(struct pg_state *st, unsigned long addr)
|
|
|
|
{
|
|
|
|
if (!st->check_wx)
|
|
|
|
return;
|
|
|
|
if (st->current_prot & _PAGE_INVALID)
|
|
|
|
return;
|
|
|
|
if (st->current_prot & _PAGE_PROTECT)
|
|
|
|
return;
|
|
|
|
if (st->current_prot & _PAGE_NOEXEC)
|
|
|
|
return;
|
2021-04-07 07:20:17 +00:00
|
|
|
/*
|
|
|
|
* The first lowcore page is W+X if spectre mitigations are using
|
|
|
|
* trampolines or the BEAR enhancements facility is not installed,
|
|
|
|
* in which case we have two lpswe instructions in lowcore that need
|
|
|
|
* to be executable.
|
|
|
|
*/
|
2025-02-07 14:49:09 +00:00
|
|
|
if (addr == PAGE_SIZE && (nospec_uses_trampoline() || !cpu_has_bear()))
|
2020-09-09 15:10:29 +00:00
|
|
|
return;
|
2024-01-30 10:34:34 +00:00
|
|
|
WARN_ONCE(IS_ENABLED(CONFIG_DEBUG_WX),
|
|
|
|
"s390/mm: Found insecure W+X mapping at address %pS\n",
|
2020-09-09 15:10:29 +00:00
|
|
|
(void *)st->start_address);
|
|
|
|
st->wx_pages += (addr - st->start_address) / PAGE_SIZE;
|
|
|
|
}
|
|
|
|
|
2024-07-23 18:49:54 +00:00
|
|
|
static void note_page_update_state(struct pg_state *st, unsigned long addr, unsigned int prot, int level)
|
|
|
|
{
|
|
|
|
struct seq_file *m = st->seq;
|
|
|
|
|
|
|
|
while (addr >= st->marker[1].start_address) {
|
|
|
|
st->marker++;
|
2024-07-29 15:09:40 +00:00
|
|
|
pt_dump_seq_printf(m, "---[ %s %s ]---\n", st->marker->name,
|
|
|
|
st->marker->is_start ? "Start" : "End");
|
2024-07-23 18:49:54 +00:00
|
|
|
}
|
|
|
|
st->start_address = addr;
|
|
|
|
st->current_prot = prot;
|
|
|
|
st->level = level;
|
|
|
|
}
|
|
|
|
|
2020-09-04 15:41:27 +00:00
|
|
|
static void note_page(struct ptdump_state *pt_st, unsigned long addr, int level, u64 val)
|
2012-10-04 12:46:12 +00:00
|
|
|
{
|
|
|
|
int width = sizeof(unsigned long) * 2;
|
2020-09-04 15:41:27 +00:00
|
|
|
static const char units[] = "KMGTPE";
|
2012-10-04 12:46:12 +00:00
|
|
|
const char *unit = units;
|
|
|
|
unsigned long delta;
|
2020-09-04 15:41:27 +00:00
|
|
|
struct pg_state *st;
|
|
|
|
struct seq_file *m;
|
|
|
|
unsigned int prot;
|
2012-10-04 12:46:12 +00:00
|
|
|
|
2020-09-04 15:41:27 +00:00
|
|
|
st = container_of(pt_st, struct pg_state, ptdump);
|
|
|
|
m = st->seq;
|
|
|
|
prot = val & (_PAGE_PROTECT | _PAGE_NOEXEC);
|
|
|
|
if (level == 4 && (val & _PAGE_INVALID))
|
|
|
|
prot = _PAGE_INVALID;
|
|
|
|
/* For pmd_none() & friends val gets passed as zero. */
|
|
|
|
if (level != 4 && !val)
|
|
|
|
prot = _PAGE_INVALID;
|
|
|
|
/* Final flush from generic code. */
|
|
|
|
if (level == -1)
|
|
|
|
addr = max_addr;
|
|
|
|
if (st->level == -1) {
|
2024-07-29 15:09:40 +00:00
|
|
|
pt_dump_seq_puts(m, "---[ Kernel Virtual Address Space ]---\n");
|
2024-07-23 18:49:54 +00:00
|
|
|
note_page_update_state(st, addr, prot, level);
|
2020-09-04 15:41:27 +00:00
|
|
|
} else if (prot != st->current_prot || level != st->level ||
|
|
|
|
addr >= st->marker[1].start_address) {
|
2020-09-09 15:10:29 +00:00
|
|
|
note_prot_wx(st, addr);
|
2020-09-09 09:14:52 +00:00
|
|
|
pt_dump_seq_printf(m, "0x%0*lx-0x%0*lx ",
|
|
|
|
width, st->start_address,
|
|
|
|
width, addr);
|
2020-09-04 15:41:27 +00:00
|
|
|
delta = (addr - st->start_address) >> 10;
|
2012-10-04 12:46:12 +00:00
|
|
|
while (!(delta & 0x3ff) && unit[1]) {
|
|
|
|
delta >>= 10;
|
|
|
|
unit++;
|
|
|
|
}
|
2020-09-09 09:14:52 +00:00
|
|
|
pt_dump_seq_printf(m, "%9lu%c ", delta, *unit);
|
2012-10-04 12:46:12 +00:00
|
|
|
print_prot(m, st->current_prot, st->level);
|
2024-07-23 18:49:54 +00:00
|
|
|
note_page_update_state(st, addr, prot, level);
|
2012-10-04 12:46:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-04-07 05:31:11 +00:00
|
|
|
static void note_page_pte(struct ptdump_state *pt_st, unsigned long addr, pte_t pte)
|
|
|
|
{
|
|
|
|
note_page(pt_st, addr, 4, pte_val(pte));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void note_page_pmd(struct ptdump_state *pt_st, unsigned long addr, pmd_t pmd)
|
|
|
|
{
|
|
|
|
note_page(pt_st, addr, 3, pmd_val(pmd));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void note_page_pud(struct ptdump_state *pt_st, unsigned long addr, pud_t pud)
|
|
|
|
{
|
|
|
|
note_page(pt_st, addr, 2, pud_val(pud));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void note_page_p4d(struct ptdump_state *pt_st, unsigned long addr, p4d_t p4d)
|
|
|
|
{
|
|
|
|
note_page(pt_st, addr, 1, p4d_val(p4d));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void note_page_pgd(struct ptdump_state *pt_st, unsigned long addr, pgd_t pgd)
|
|
|
|
{
|
|
|
|
note_page(pt_st, addr, 0, pgd_val(pgd));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void note_page_flush(struct ptdump_state *pt_st)
|
|
|
|
{
|
|
|
|
pte_t pte_zero = {0};
|
|
|
|
|
|
|
|
note_page(pt_st, 0, -1, pte_val(pte_zero));
|
|
|
|
}
|
|
|
|
|
2024-01-30 10:34:35 +00:00
|
|
|
bool ptdump_check_wx(void)
|
2020-09-09 15:10:29 +00:00
|
|
|
{
|
|
|
|
struct pg_state st = {
|
|
|
|
.ptdump = {
|
2025-04-07 05:31:11 +00:00
|
|
|
.note_page_pte = note_page_pte,
|
|
|
|
.note_page_pmd = note_page_pmd,
|
|
|
|
.note_page_pud = note_page_pud,
|
|
|
|
.note_page_p4d = note_page_p4d,
|
|
|
|
.note_page_pgd = note_page_pgd,
|
|
|
|
.note_page_flush = note_page_flush,
|
2020-09-09 15:10:29 +00:00
|
|
|
.range = (struct ptdump_range[]) {
|
|
|
|
{.start = 0, .end = max_addr},
|
|
|
|
{.start = 0, .end = 0},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
.seq = NULL,
|
|
|
|
.level = -1,
|
|
|
|
.current_prot = 0,
|
|
|
|
.check_wx = true,
|
|
|
|
.wx_pages = 0,
|
|
|
|
.start_address = 0,
|
|
|
|
.marker = (struct addr_marker[]) {
|
|
|
|
{ .start_address = 0, .name = NULL},
|
|
|
|
{ .start_address = -1, .name = NULL},
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2025-02-07 14:48:50 +00:00
|
|
|
if (!cpu_has_nx())
|
2024-01-30 10:34:35 +00:00
|
|
|
return true;
|
2020-09-09 15:10:29 +00:00
|
|
|
ptdump_walk_pgd(&st.ptdump, &init_mm, NULL);
|
2024-01-30 10:34:35 +00:00
|
|
|
if (st.wx_pages) {
|
2020-09-09 15:10:29 +00:00
|
|
|
pr_warn("Checked W+X mappings: FAILED, %lu W+X pages found\n", st.wx_pages);
|
2024-01-30 10:34:35 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
} else {
|
2021-04-07 07:20:17 +00:00
|
|
|
pr_info("Checked W+X mappings: passed, no %sW+X pages found\n",
|
2025-02-07 14:49:09 +00:00
|
|
|
(nospec_uses_trampoline() || !cpu_has_bear()) ?
|
2021-04-07 07:20:17 +00:00
|
|
|
"unexpected " : "");
|
2024-01-30 10:34:35 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2020-09-09 15:10:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_PTDUMP_DEBUGFS
|
2012-10-04 12:46:12 +00:00
|
|
|
static int ptdump_show(struct seq_file *m, void *v)
|
|
|
|
{
|
2020-09-04 15:41:27 +00:00
|
|
|
struct pg_state st = {
|
|
|
|
.ptdump = {
|
2025-04-07 05:31:11 +00:00
|
|
|
.note_page_pte = note_page_pte,
|
|
|
|
.note_page_pmd = note_page_pmd,
|
|
|
|
.note_page_pud = note_page_pud,
|
|
|
|
.note_page_p4d = note_page_p4d,
|
|
|
|
.note_page_pgd = note_page_pgd,
|
|
|
|
.note_page_flush = note_page_flush,
|
2020-09-04 15:41:27 +00:00
|
|
|
.range = (struct ptdump_range[]) {
|
|
|
|
{.start = 0, .end = max_addr},
|
|
|
|
{.start = 0, .end = 0},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
.seq = m,
|
|
|
|
.level = -1,
|
|
|
|
.current_prot = 0,
|
2020-09-09 15:10:29 +00:00
|
|
|
.check_wx = false,
|
|
|
|
.wx_pages = 0,
|
2020-09-04 15:41:27 +00:00
|
|
|
.start_address = 0,
|
2024-07-29 15:09:40 +00:00
|
|
|
.marker = markers,
|
2020-09-04 15:41:27 +00:00
|
|
|
};
|
|
|
|
|
2020-09-07 15:11:36 +00:00
|
|
|
get_online_mems();
|
2020-09-07 15:20:05 +00:00
|
|
|
mutex_lock(&cpa_mutex);
|
2020-09-04 15:41:27 +00:00
|
|
|
ptdump_walk_pgd(&st.ptdump, &init_mm, NULL);
|
2020-09-07 15:20:05 +00:00
|
|
|
mutex_unlock(&cpa_mutex);
|
2020-09-07 15:11:36 +00:00
|
|
|
put_online_mems();
|
2012-10-04 12:46:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2020-09-04 15:41:27 +00:00
|
|
|
DEFINE_SHOW_ATTRIBUTE(ptdump);
|
2020-09-09 15:10:29 +00:00
|
|
|
#endif /* CONFIG_PTDUMP_DEBUGFS */
|
2012-10-04 12:46:12 +00:00
|
|
|
|
2024-07-23 18:49:55 +00:00
|
|
|
static int ptdump_cmp(const void *a, const void *b)
|
2020-09-10 20:51:17 +00:00
|
|
|
{
|
2024-07-23 18:49:55 +00:00
|
|
|
const struct addr_marker *ama = a;
|
|
|
|
const struct addr_marker *amb = b;
|
2020-09-10 20:51:17 +00:00
|
|
|
|
2024-07-23 18:49:55 +00:00
|
|
|
if (ama->start_address > amb->start_address)
|
|
|
|
return 1;
|
|
|
|
if (ama->start_address < amb->start_address)
|
|
|
|
return -1;
|
|
|
|
/*
|
2024-07-29 15:09:40 +00:00
|
|
|
* If the start addresses of two markers are identical sort markers in an
|
|
|
|
* order that considers areas contained within other areas correctly.
|
2024-07-23 18:49:55 +00:00
|
|
|
*/
|
2024-07-29 15:09:40 +00:00
|
|
|
if (ama->is_start && amb->is_start) {
|
|
|
|
if (ama->size > amb->size)
|
|
|
|
return -1;
|
|
|
|
if (ama->size < amb->size)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!ama->is_start && !amb->is_start) {
|
|
|
|
if (ama->size > amb->size)
|
|
|
|
return 1;
|
|
|
|
if (ama->size < amb->size)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
2024-07-23 18:49:55 +00:00
|
|
|
if (ama->is_start)
|
|
|
|
return 1;
|
|
|
|
if (amb->is_start)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
2020-09-10 20:51:17 +00:00
|
|
|
}
|
|
|
|
|
2024-07-29 15:09:40 +00:00
|
|
|
static int add_marker(unsigned long start, unsigned long end, const char *name)
|
|
|
|
{
|
|
|
|
size_t oldsize, newsize;
|
|
|
|
|
|
|
|
oldsize = markers_cnt * sizeof(*markers);
|
|
|
|
newsize = oldsize + 2 * sizeof(*markers);
|
|
|
|
if (!oldsize)
|
|
|
|
markers = kvmalloc(newsize, GFP_KERNEL);
|
|
|
|
else
|
s390 updates for 6.12 merge window
- Optimize ftrace and kprobes code patching and avoid stop machine for
kprobes if sequential instruction fetching facility is available
- Add hiperdispatch feature to dynamically adjust CPU capacity in
vertical polarization to improve scheduling efficiency and overall
performance. Also add infrastructure for handling warning track
interrupts (WTI), allowing for graceful CPU preemption
- Rework crypto code pkey module and split it into separate, independent
modules for sysfs, PCKMO, CCA, and EP11, allowing modules to load only
when the relevant hardware is available
- Add hardware acceleration for HMAC modes and the full AES-XTS cipher,
utilizing message-security assist extensions (MSA) 10 and 11. It
introduces new shash implementations for HMAC-SHA224/256/384/512 and
registers the hardware-accelerated AES-XTS cipher as the preferred
option. Also add clear key token support
- Add MSA 10 and 11 processor activity instrumentation counters to perf
and update PAI Extension 1 NNPA counters
- Cleanup cpu sampling facility code and rework debug/WARN_ON_ONCE
statements
- Add support for SHA3 performance enhancements introduced with MSA 12
- Add support for the query authentication information feature of
MSA 13 and introduce the KDSA CPACF instruction. Provide query and query
authentication information in sysfs, enabling tools like cpacfinfo to
present this data in a human-readable form
- Update kernel disassembler instructions
- Always enable EXPOLINE_EXTERN if supported by the compiler to ensure
kpatch compatibility
- Add missing warning handling and relocated lowcore support to the
early program check handler
- Optimize ftrace_return_address() and avoid calling unwinder
- Make modules use kernel ftrace trampolines
- Strip relocs from the final vmlinux ELF file to make it roughly 2
times smaller
- Dump register contents and call trace for early crashes to the console
- Generate ptdump address marker array dynamically
- Fix rcu_sched stalls that might occur when adding or removing large
amounts of pages at once to or from the CMM balloon
- Fix deadlock caused by recursive lock of the AP bus scan mutex
- Unify sync and async register save areas in entry code
- Cleanup debug prints in crypto code
- Various cleanup and sanitizing patches for the decompressor
- Various small ftrace cleanups
-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEE3QHqV+H2a8xAv27vjYWKoQLXFBgFAmbsZawACgkQjYWKoQLX
FBg+Ogf+NiKPfvI14NcTwnOHB6qz8ApPdGfN9bNVtQxtK3epeAvtj0cMonAuKpRg
xckTRRd8y0guhCT7Q2+WitSgA5eYDn+u9/Ux5YuKUdUdXolQ0D64BJNtVeEFkmJj
s+Lesb8cVI9T2VBZOpuF9lJigfsDALBkFroqN4MDudDeahS+qy33bAc0OoqYNXHo
S6OwPK1/tEG9O/oTN2V4mN+aP0B3/dl7Msezb0gfAXQJA+WUAyMNK0RHvoG9uzaa
BWAyWWYABj6woGZEAQAzXcbzkQiRPixTqZVe6e4YndXhIlEnB/Z2AQFdTpT9V7En
eOmmve3QuJa0hkF9q4H/anvOMPntTg==
=Xagq
-----END PGP SIGNATURE-----
Merge tag 's390-6.12-1' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux
Pull s390 updates from Vasily Gorbik:
- Optimize ftrace and kprobes code patching and avoid stop machine for
kprobes if sequential instruction fetching facility is available
- Add hiperdispatch feature to dynamically adjust CPU capacity in
vertical polarization to improve scheduling efficiency and overall
performance. Also add infrastructure for handling warning track
interrupts (WTI), allowing for graceful CPU preemption
- Rework crypto code pkey module and split it into separate,
independent modules for sysfs, PCKMO, CCA, and EP11, allowing modules
to load only when the relevant hardware is available
- Add hardware acceleration for HMAC modes and the full AES-XTS cipher,
utilizing message-security assist extensions (MSA) 10 and 11. It
introduces new shash implementations for HMAC-SHA224/256/384/512 and
registers the hardware-accelerated AES-XTS cipher as the preferred
option. Also add clear key token support
- Add MSA 10 and 11 processor activity instrumentation counters to perf
and update PAI Extension 1 NNPA counters
- Cleanup cpu sampling facility code and rework debug/WARN_ON_ONCE
statements
- Add support for SHA3 performance enhancements introduced with MSA 12
- Add support for the query authentication information feature of MSA
13 and introduce the KDSA CPACF instruction. Provide query and query
authentication information in sysfs, enabling tools like cpacfinfo to
present this data in a human-readable form
- Update kernel disassembler instructions
- Always enable EXPOLINE_EXTERN if supported by the compiler to ensure
kpatch compatibility
- Add missing warning handling and relocated lowcore support to the
early program check handler
- Optimize ftrace_return_address() and avoid calling unwinder
- Make modules use kernel ftrace trampolines
- Strip relocs from the final vmlinux ELF file to make it roughly 2
times smaller
- Dump register contents and call trace for early crashes to the
console
- Generate ptdump address marker array dynamically
- Fix rcu_sched stalls that might occur when adding or removing large
amounts of pages at once to or from the CMM balloon
- Fix deadlock caused by recursive lock of the AP bus scan mutex
- Unify sync and async register save areas in entry code
- Cleanup debug prints in crypto code
- Various cleanup and sanitizing patches for the decompressor
- Various small ftrace cleanups
* tag 's390-6.12-1' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux: (84 commits)
s390/crypto: Display Query and Query Authentication Information in sysfs
s390/crypto: Add Support for Query Authentication Information
s390/crypto: Rework RRE and RRF CPACF inline functions
s390/crypto: Add KDSA CPACF Instruction
s390/disassembler: Remove duplicate instruction format RSY_RDRU
s390/boot: Move boot_printk() code to own file
s390/boot: Use boot_printk() instead of sclp_early_printk()
s390/boot: Rename decompressor_printk() to boot_printk()
s390/boot: Compile all files with the same march flag
s390: Use MARCH_HAS_*_FEATURES defines
s390: Provide MARCH_HAS_*_FEATURES defines
s390/facility: Disable compile time optimization for decompressor code
s390/boot: Increase minimum architecture to z10
s390/als: Remove obsolete comment
s390/sha3: Fix SHA3 selftests failures
s390/pkey: Add AES xts and HMAC clear key token support
s390/cpacf: Add MSA 10 and 11 new PCKMO functions
s390/mm: Add cond_resched() to cmm_alloc/free_pages()
s390/pai_ext: Update PAI extension 1 counters
s390/pai_crypto: Add support for MSA 10 and 11 pai counters
...
2024-09-21 16:02:54 +00:00
|
|
|
markers = kvrealloc(markers, newsize, GFP_KERNEL);
|
2024-07-29 15:09:40 +00:00
|
|
|
if (!markers)
|
|
|
|
goto error;
|
|
|
|
markers[markers_cnt].is_start = 1;
|
|
|
|
markers[markers_cnt].start_address = start;
|
|
|
|
markers[markers_cnt].size = end - start;
|
|
|
|
markers[markers_cnt].name = name;
|
|
|
|
markers_cnt++;
|
|
|
|
markers[markers_cnt].is_start = 0;
|
|
|
|
markers[markers_cnt].start_address = end;
|
|
|
|
markers[markers_cnt].size = end - start;
|
|
|
|
markers[markers_cnt].name = name;
|
|
|
|
markers_cnt++;
|
|
|
|
return 0;
|
|
|
|
error:
|
|
|
|
markers_cnt = 0;
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2012-10-04 12:46:12 +00:00
|
|
|
static int pt_dump_init(void)
|
|
|
|
{
|
2021-07-28 19:02:54 +00:00
|
|
|
#ifdef CONFIG_KFENCE
|
|
|
|
unsigned long kfence_start = (unsigned long)__kfence_pool;
|
|
|
|
#endif
|
2024-07-23 18:49:54 +00:00
|
|
|
unsigned long lowcore = (unsigned long)get_lowcore();
|
2024-07-29 15:09:40 +00:00
|
|
|
int rc;
|
2024-07-23 18:49:54 +00:00
|
|
|
|
2012-10-04 12:46:12 +00:00
|
|
|
/*
|
|
|
|
* Figure out the maximum virtual address being accessible with the
|
|
|
|
* kernel ASCE. We need this to keep the page table walker functions
|
|
|
|
* from accessing non-existent entries.
|
|
|
|
*/
|
2024-06-10 11:45:25 +00:00
|
|
|
max_addr = (get_lowcore()->kernel_asce.val & _REGION_ENTRY_TYPE_MASK) >> 2;
|
2012-10-04 12:46:12 +00:00
|
|
|
max_addr = 1UL << (max_addr * 11 + 31);
|
2024-07-29 15:09:40 +00:00
|
|
|
/* start + end markers - must be added first */
|
|
|
|
rc = add_marker(0, -1UL, NULL);
|
|
|
|
rc |= add_marker((unsigned long)_stext, (unsigned long)_end, "Kernel Image");
|
|
|
|
rc |= add_marker(lowcore, lowcore + sizeof(struct lowcore), "Lowcore");
|
|
|
|
rc |= add_marker(__identity_base, __identity_base + ident_map_size, "Identity Mapping");
|
|
|
|
rc |= add_marker((unsigned long)__samode31, (unsigned long)__eamode31, "Amode31 Area");
|
|
|
|
rc |= add_marker(MODULES_VADDR, MODULES_END, "Modules Area");
|
|
|
|
rc |= add_marker(__abs_lowcore, __abs_lowcore + ABS_LOWCORE_MAP_SIZE, "Lowcore Area");
|
|
|
|
rc |= add_marker(__memcpy_real_area, __memcpy_real_area + MEMCPY_REAL_SIZE, "Real Memory Copy Area");
|
|
|
|
rc |= add_marker((unsigned long)vmemmap, (unsigned long)vmemmap + vmemmap_size, "vmemmap Area");
|
|
|
|
rc |= add_marker(VMALLOC_START, VMALLOC_END, "vmalloc Area");
|
2021-07-28 19:02:54 +00:00
|
|
|
#ifdef CONFIG_KFENCE
|
2024-07-29 15:09:40 +00:00
|
|
|
rc |= add_marker(kfence_start, kfence_start + KFENCE_POOL_SIZE, "KFence Pool");
|
2024-07-23 12:44:12 +00:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_KMSAN
|
2024-07-29 15:09:40 +00:00
|
|
|
rc |= add_marker(KMSAN_VMALLOC_SHADOW_START, KMSAN_VMALLOC_SHADOW_END, "Kmsan vmalloc Shadow");
|
|
|
|
rc |= add_marker(KMSAN_VMALLOC_ORIGIN_START, KMSAN_VMALLOC_ORIGIN_END, "Kmsan vmalloc Origins");
|
|
|
|
rc |= add_marker(KMSAN_MODULES_SHADOW_START, KMSAN_MODULES_SHADOW_END, "Kmsan Modules Shadow");
|
|
|
|
rc |= add_marker(KMSAN_MODULES_ORIGIN_START, KMSAN_MODULES_ORIGIN_END, "Kmsan Modules Origins");
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_KASAN
|
|
|
|
rc |= add_marker(KASAN_SHADOW_START, KASAN_SHADOW_END, "Kasan Shadow");
|
2021-07-28 19:02:54 +00:00
|
|
|
#endif
|
2024-07-29 15:09:40 +00:00
|
|
|
if (rc)
|
|
|
|
goto error;
|
|
|
|
sort(&markers[1], markers_cnt - 1, sizeof(*markers), ptdump_cmp, NULL);
|
2020-09-15 10:52:36 +00:00
|
|
|
#ifdef CONFIG_PTDUMP_DEBUGFS
|
|
|
|
debugfs_create_file("kernel_page_tables", 0400, NULL, NULL, &ptdump_fops);
|
|
|
|
#endif /* CONFIG_PTDUMP_DEBUGFS */
|
2012-10-04 12:46:12 +00:00
|
|
|
return 0;
|
2024-07-29 15:09:40 +00:00
|
|
|
error:
|
|
|
|
kvfree(markers);
|
|
|
|
return -ENOMEM;
|
2012-10-04 12:46:12 +00:00
|
|
|
}
|
|
|
|
device_initcall(pt_dump_init);
|