Skip to content
This repository has been archived by the owner on Aug 27, 2022. It is now read-only.

Commit

Permalink
modules: don't hand 0 to vmalloc.
Browse files Browse the repository at this point in the history
In commit d0a2126 David Rientjes unified various archs'
module_alloc implementation (including x86) and removed the graduitous
shortcut for size == 0.

Then, in commit de7d2b5, Joe Perches added a warning for
zero-length vmallocs, which can happen without kallsyms on modules
with no init sections (eg. zlib_deflate).

Fix this once and for all; the module code has to handle zero length
anyway, so get it right at the caller and remove the now-gratuitous
checks within the arch-specific module_alloc implementations.

Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=42608
Reported-by: Conrad Kostecki <ConiKost@gmx.de>
Cc: David Rientjes <rientjes@google.com>
Cc: Joe Perches <joe@perches.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
  • Loading branch information
rustyrussell committed Dec 14, 2012
1 parent 54523ec commit 82fab44
Show file tree
Hide file tree
Showing 6 changed files with 18 additions and 28 deletions.
2 changes: 0 additions & 2 deletions arch/cris/kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -32,8 +32,6 @@
#ifdef CONFIG_ETRAX_KMALLOCED_MODULES
void *module_alloc(unsigned long size)
{
if (size == 0)
return NULL;
return kmalloc(size, GFP_KERNEL);
}

Expand Down
2 changes: 0 additions & 2 deletions arch/parisc/kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -214,8 +214,6 @@ static inline int reassemble_22(int as22)

void *module_alloc(unsigned long size)
{
if (size == 0)
return NULL;
/* using RWX means less protection for modules, but it's
* easier than trying to map the text, data, init_text and
* init_data correctly */
Expand Down
4 changes: 0 additions & 4 deletions arch/sparc/kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -43,10 +43,6 @@ void *module_alloc(unsigned long size)
{
void *ret;

/* We handle the zero case fine, unlike vmalloc */
if (size == 0)
return NULL;

ret = module_map(size);
if (ret)
memset(ret, 0, size);
Expand Down
2 changes: 0 additions & 2 deletions arch/tile/kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -42,8 +42,6 @@ void *module_alloc(unsigned long size)
int i = 0;
int npages;

if (size == 0)
return NULL;
npages = (size + PAGE_SIZE - 1) / PAGE_SIZE;
pages = kmalloc(npages * sizeof(struct page *), GFP_KERNEL);
if (pages == NULL)
Expand Down
3 changes: 0 additions & 3 deletions arch/unicore32/kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -27,9 +27,6 @@ void *module_alloc(unsigned long size)
struct vm_struct *area;

size = PAGE_ALIGN(size);
if (!size)
return NULL;

area = __get_vm_area(size, VM_ALLOC, MODULES_VADDR, MODULES_END);
if (!area)
return NULL;
Expand Down
33 changes: 18 additions & 15 deletions kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -2377,7 +2377,7 @@ static void dynamic_debug_remove(struct _ddebug *debug)

void * __weak module_alloc(unsigned long size)
{
return size == 0 ? NULL : vmalloc_exec(size);
return vmalloc_exec(size);
}

static void *module_alloc_update_bounds(unsigned long size)
Expand Down Expand Up @@ -2793,20 +2793,23 @@ static int move_module(struct module *mod, struct load_info *info)
memset(ptr, 0, mod->core_size);
mod->module_core = ptr;

ptr = module_alloc_update_bounds(mod->init_size);
/*
* The pointer to this block is stored in the module structure
* which is inside the block. This block doesn't need to be
* scanned as it contains data and code that will be freed
* after the module is initialized.
*/
kmemleak_ignore(ptr);
if (!ptr && mod->init_size) {
module_free(mod, mod->module_core);
return -ENOMEM;
}
memset(ptr, 0, mod->init_size);
mod->module_init = ptr;
if (mod->init_size) {
ptr = module_alloc_update_bounds(mod->init_size);
/*
* The pointer to this block is stored in the module structure
* which is inside the block. This block doesn't need to be
* scanned as it contains data and code that will be freed
* after the module is initialized.
*/
kmemleak_ignore(ptr);
if (!ptr) {
module_free(mod, mod->module_core);
return -ENOMEM;
}
memset(ptr, 0, mod->init_size);
mod->module_init = ptr;
} else
mod->module_init = NULL;

/* Transfer each section which specifies SHF_ALLOC */
pr_debug("final section addresses:\n");
Expand Down

0 comments on commit 82fab44

Please sign in to comment.