]> glassweightruler.freedombox.rocks Git - Ventoy.git/blob - DMPATCH/dmpatch.c
Fix the issue when booting latest systemrescue
[Ventoy.git] / DMPATCH / dmpatch.c
1 /******************************************************************************
2 * dmpatch.c ---- patch for device-mapper
3 *
4 * Copyright (c) 2021, longpanda <admin@ventoy.net>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License as
8 * published by the Free Software Foundation; either version 3 of the
9 * License, or (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 *
19 */
20
21 #include <linux/init.h>
22 #include <linux/module.h>
23 #include <linux/kallsyms.h>
24 #include <linux/mutex.h>
25 #include <linux/mempool.h>
26 #include <linux/delay.h>
27 #include <linux/wait.h>
28 #include <linux/slab.h>
29
30 #define MAX_PATCH 4
31
32 #define magic_sig 0xB0, 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6, 0xB7, 0xB8, 0xB9, 0xBA, 0xBB, 0xBC, 0xBD, 0xBE, 0xBF
33
34 typedef int (*kprobe_reg_pf)(void *);
35 typedef void (*kprobe_unreg_pf)(void *);
36 typedef int (*printk_pf)(const char *fmt, ...);
37 typedef int (*set_memory_attr_pf)(unsigned long addr, int numpages);
38
39 #pragma pack(1)
40 typedef struct ko_param
41 {
42 unsigned char magic[16];
43 unsigned long struct_size;
44 unsigned long pgsize;
45 unsigned long printk_addr;
46 unsigned long ro_addr;
47 unsigned long rw_addr;
48 unsigned long reg_kprobe_addr;
49 unsigned long unreg_kprobe_addr;
50 unsigned long sym_get_addr;
51 unsigned long sym_get_size;
52 unsigned long sym_put_addr;
53 unsigned long sym_put_size;
54 unsigned long padding[3];
55 }ko_param;
56
57 #pragma pack()
58
59 static printk_pf kprintf = NULL;
60 static set_memory_attr_pf set_mem_ro = NULL;
61 static set_memory_attr_pf set_mem_rw = NULL;
62 static kprobe_reg_pf reg_kprobe = NULL;
63 static kprobe_unreg_pf unreg_kprobe = NULL;
64
65 static volatile ko_param g_ko_param =
66 {
67 { magic_sig },
68 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
69 };
70
71 #if defined(CONFIG_X86_64)
72 #define PATCH_OP_POS 3
73 #define CODE_MATCH(code, i) \
74 (code[i] == 0x40 && code[i + 1] == 0x80 && code[i + 2] == 0xce && code[i + 3] == 0x80)
75 #elif defined(CONFIG_X86_32)
76 #define PATCH_OP_POS 2
77 #define CODE_MATCH(code, i) \
78 (code[i] == 0x80 && code[i + 1] == 0xca && code[i + 2] == 0x80 && code[i + 3] == 0xe8)
79 #else
80 #error "unsupported arch"
81 #endif
82
83 #define vdebug(fmt, args...) if(kprintf) kprintf(KERN_ERR fmt, ##args)
84
85 static int notrace dmpatch_replace_code(unsigned long addr, unsigned long size, int expect, const char *desc)
86 {
87 int i = 0;
88 int cnt = 0;
89 unsigned long align;
90 unsigned char *patch[MAX_PATCH];
91 unsigned char *opCode = (unsigned char *)addr;
92
93 vdebug("patch for %s 0x%lx %d\n", desc, addr, (int)size);
94
95 for (i = 0; i < (int)size - 4; i++)
96 {
97 if (CODE_MATCH(opCode, i) && cnt < MAX_PATCH)
98 {
99 patch[cnt] = opCode + i + PATCH_OP_POS;
100 cnt++;
101 }
102 }
103
104 if (cnt != expect || cnt >= MAX_PATCH)
105 {
106 vdebug("patch error: cnt=%d expect=%d\n", cnt, expect);
107 return 1;
108 }
109
110
111 for (i = 0; i < cnt; i++)
112 {
113 opCode = patch[i];
114 align = (unsigned long)opCode / g_ko_param.pgsize * g_ko_param.pgsize;
115
116 set_mem_rw(align, 1);
117 *opCode = 0;
118 set_mem_ro(align, 1);
119 }
120
121 return 0;
122 }
123
124 static int notrace dmpatch_init(void)
125 {
126 int r = 0;
127 int rc = 0;
128
129 kprintf = (printk_pf)(g_ko_param.printk_addr);
130
131 vdebug("dmpatch_init start pagesize=%lu ...\n", g_ko_param.pgsize);
132
133 if (g_ko_param.struct_size != sizeof(ko_param))
134 {
135 vdebug("Invalid struct size %d %d\n", (int)g_ko_param.struct_size, (int)sizeof(ko_param));
136 return -EINVAL;
137 }
138
139 if (g_ko_param.sym_get_addr == 0 || g_ko_param.sym_put_addr == 0 ||
140 g_ko_param.ro_addr == 0 || g_ko_param.rw_addr == 0)
141 {
142 return -EINVAL;
143 }
144
145 set_mem_ro = (set_memory_attr_pf)(g_ko_param.ro_addr);
146 set_mem_rw = (set_memory_attr_pf)(g_ko_param.rw_addr);
147 reg_kprobe = (kprobe_reg_pf)g_ko_param.reg_kprobe_addr;
148 unreg_kprobe = (kprobe_unreg_pf)g_ko_param.unreg_kprobe_addr;
149
150 r = dmpatch_replace_code(g_ko_param.sym_get_addr, g_ko_param.sym_get_size, 2, "dm_get_table_device");
151 if (r)
152 {
153 rc = -EINVAL;
154 goto out;
155 }
156 vdebug("patch dm_get_table_device success\n");
157
158 r = dmpatch_replace_code(g_ko_param.sym_put_addr, g_ko_param.sym_put_size, 1, "dm_put_table_device");
159 if (r)
160 {
161 rc = -EINVAL;
162 goto out;
163 }
164 vdebug("patch dm_put_table_device success\n");
165
166 vdebug("#####################################\n");
167 vdebug("######## dm patch success ###########\n");
168 vdebug("#####################################\n");
169
170 out:
171
172 return rc;
173 }
174
175 static void notrace dmpatch_exit(void)
176 {
177
178 }
179
180 module_init(dmpatch_init);
181 module_exit(dmpatch_exit);
182
183
184 MODULE_DESCRIPTION("dmpatch driver");
185 MODULE_AUTHOR("longpanda <admin@ventoy.net>");
186 MODULE_LICENSE("GPL");
187