From 7b30b6636cb1fe94fb0cc57aa205c08ea2a58967 Mon Sep 17 00:00:00 2001 From: liankong Date: Sat, 29 Mar 2025 22:46:18 +0800 Subject: [PATCH 01/10] =?UTF-8?q?=E5=B0=9D=E8=AF=95=E4=BF=AE=E5=A4=8D?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/compact.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/kernel/kpm/compact.c b/kernel/kpm/compact.c index d6f69705..61e99a35 100644 --- a/kernel/kpm/compact.c +++ b/kernel/kpm/compact.c @@ -31,7 +31,7 @@ unsigned long sukisu_compact_find_symbol(const char* name); // ====================================================================== -const char* kver = "0.10"; +const char* kpver = "0.10"; struct CompactAddressSymbol { const char* symbol_name; @@ -46,17 +46,17 @@ struct CompactAliasSymbol { struct CompactAddressSymbol address_symbol [] = { { "kallsyms_lookup_name", &kallsyms_lookup_name }, { "compact_find_symbol", &sukisu_compact_find_symbol }, - { "compact_copy_to_user", ©_to_user }, - { "compact_strncpy_from_user", &strncpy_from_user }, - { "kver", &kver }, + { "compat_copy_to_user", ©_to_user }, + { "compat_strncpy_from_user", &strncpy_from_user }, + { "kpver", &kpver }, { "is_run_in_sukisu_ultra", (void*)1 } }; struct CompactAliasSymbol alias_symbol[] = { - {"kf__strncat", "strncat"}, - {"kf__strlen", "strlen" }, - {"kf__strcpy", "strcpy"}, - {"compact_copy_to_user", "__arch_copy_to_user"} + {"kf_strncat", "strncat"}, + {"kf_strlen", "strlen" }, + {"kf_strcpy", "strcpy"}, + {"compat_copy_to_user", "__arch_copy_to_user"} }; unsigned long sukisu_compact_find_symbol(const char* name) { From 0ff2aedd653a7cf889245d55caf0c8111701c040 Mon Sep 17 00:00:00 2001 From: liankong Date: Sat, 29 Mar 2025 23:09:16 +0800 Subject: [PATCH 02/10] =?UTF-8?q?=E6=8C=89=E7=85=A7AI=E7=BB=99=E5=87=BA?= =?UTF-8?q?=E5=BB=BA=E8=AE=AE=E4=BF=AE=E5=A4=8D?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/kpm.c | 86 ++++++++++++++++++++++++++++++++++-------------- 1 file changed, 61 insertions(+), 25 deletions(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index 1b84cbf6..a790bbd7 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -481,45 +481,81 @@ static int kpm_rewrite_section_headers(struct kpm_load_info *info) /*----------------------------------------------------------- * 将各段复制到连续内存区域中 *----------------------------------------------------------*/ +/*----------------------------------------------------------- + * 将各段复制到连续内存区域(修复版) + * 关键修复点: + * 1. 段地址按对齐要求正确计算 + * 2. 显式设置可执行内存权限 + * 3. 刷新指令缓存保证一致性 + *----------------------------------------------------------*/ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) { int i; + unsigned long curr_offset = 0; + Elf64_Shdr *shdr; - printk(KERN_INFO "ARM64 KPM Loader: Allocating module memory: size=0x%x\n", mod->size); - mod->start = kpm_malloc_exec(mod->size); - if (!mod->start) + /* 分配连续内存(按页对齐) */ + mod->size = ALIGN(mod->size, PAGE_SIZE); + mod->start = module_alloc(mod->size); // 使用内核的 module_alloc 接口 + if (!mod->start) { + printk(KERN_ERR "ARM64 KPM Loader: Failed to allocate module memory\n"); return -ENOMEM; + } memset(mod->start, 0, mod->size); - printk(KERN_INFO "ARM64 KPM Loader: Final section addresses:\n"); - for (i = 1; i < info->ehdr->e_shnum; i++) { - void *dest; - Elf64_Shdr *shdr = &info->sechdrs[i]; + /* 设置内存可执行权限(关键修复) */ + set_memory_x((unsigned long)mod->start, mod->size >> PAGE_SHIFT); + + printk(KERN_INFO "ARM64 KPM Loader: Final section addresses (aligned base=0x%px):\n", mod->start); + + /* 遍历所有段并按对齐要求布局 */ + for (i = 0; i < info->ehdr->e_shnum; i++) { + shdr = &info->sechdrs[i]; if (!(shdr->sh_flags & SHF_ALLOC)) continue; - dest = mod->start + shdr->sh_entsize; - if (shdr->sh_type != SHT_NOBITS) + + /* 按段对齐要求调整偏移 */ + curr_offset = ALIGN(curr_offset, shdr->sh_addralign); + void *dest = mod->start + curr_offset; + + /* 复制段内容(NOBITS 段不复制) */ + if (shdr->sh_type != SHT_NOBITS) { memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size); + + /* 刷新指令缓存(针对可执行段) */ + if (shdr->sh_flags & SHF_EXECINSTR) { + flush_icache_range((unsigned long)dest, + (unsigned long)dest + shdr->sh_size); + } + } + + /* 更新段头中的虚拟地址 */ shdr->sh_addr = (unsigned long)dest; - if (!mod->init && !strcmp(".kpm.init", info->secstrings + shdr->sh_name)) + curr_offset += shdr->sh_size; + + /* 定位关键函数指针 */ + const char *secname = info->secstrings + shdr->sh_name; + if (!mod->init && !strcmp(".kpm.init", secname)) { mod->init = (int (*)(const char *, const char *, void *__user))dest; - if (!strcmp(".kpm.exit", info->secstrings + shdr->sh_name)) + printk(KERN_DEBUG "Found .kpm.init at 0x%px\n", dest); + } else if (!strcmp(".kpm.exit", secname)) { mod->exit = (void (*)(void *__user))dest; - if (!strcmp(".kpm.ctl0", info->secstrings + shdr->sh_name)) - mod->ctl0 = (int (*)(const char *, char *__user, int))dest; - if (!strcmp(".kpm.ctl1", info->secstrings + shdr->sh_name)) - mod->ctl1 = (int (*)(void *, void *, void *))dest; - if (!mod->info.base && !strcmp(".kpm.info", info->secstrings + shdr->sh_name)) - mod->info.base = (const char *)dest; + } } - mod->info.name = info->info.name - info->info.base + mod->info.base; - mod->info.version = info->info.version - info->info.base + mod->info.base; - if (info->info.license) - mod->info.license = info->info.license - info->info.base + mod->info.base; - if (info->info.author) - mod->info.author = info->info.author - info->info.base + mod->info.base; - if (info->info.description) - mod->info.description = info->info.description - info->info.base + mod->info.base; + + /* 调整元数据指针(基于新基址) */ + if (info->info.base) { + unsigned long delta = (unsigned long)mod->start - (unsigned long)info->hdr; + mod->info.name = (const char *)((unsigned long)info->info.name + delta); + mod->info.version = (const char *)((unsigned long)info->info.version + delta); + if (info->info.license) + mod->info.license = (const char *)((unsigned long)info->info.license + delta); + if (info->info.author) + mod->info.author = (const char *)((unsigned long)info->info.author + delta); + if (info->info.description) + mod->info.description = (const char *)((unsigned long)info->info.description + delta); + } + return 0; } From 032bc68154182e4ce9cb257b07170e8e22d67fd6 Mon Sep 17 00:00:00 2001 From: liankong Date: Sat, 29 Mar 2025 23:20:48 +0800 Subject: [PATCH 03/10] 1 --- kernel/kpm/kpm.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index a790bbd7..5af62d2e 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -493,6 +493,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) int i; unsigned long curr_offset = 0; Elf64_Shdr *shdr; + void *dest; /* 分配连续内存(按页对齐) */ mod->size = ALIGN(mod->size, PAGE_SIZE); @@ -516,7 +517,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) /* 按段对齐要求调整偏移 */ curr_offset = ALIGN(curr_offset, shdr->sh_addralign); - void *dest = mod->start + curr_offset; + dest = mod->start + curr_offset; /* 复制段内容(NOBITS 段不复制) */ if (shdr->sh_type != SHT_NOBITS) { From 17a2efb135f8c60764393860b78694ad71c07399 Mon Sep 17 00:00:00 2001 From: liankong Date: Sat, 29 Mar 2025 23:28:27 +0800 Subject: [PATCH 04/10] 2 --- kernel/kpm/kpm.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index 5af62d2e..172b4646 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -494,6 +494,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) unsigned long curr_offset = 0; Elf64_Shdr *shdr; void *dest; + const char *secname; /* 分配连续内存(按页对齐) */ mod->size = ALIGN(mod->size, PAGE_SIZE); @@ -535,7 +536,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) curr_offset += shdr->sh_size; /* 定位关键函数指针 */ - const char *secname = info->secstrings + shdr->sh_name; + secname = info->secstrings + shdr->sh_name; if (!mod->init && !strcmp(".kpm.init", secname)) { mod->init = (int (*)(const char *, const char *, void *__user))dest; printk(KERN_DEBUG "Found .kpm.init at 0x%px\n", dest); From bd8f051c73c568a3d47ee14931c332cc497424fb Mon Sep 17 00:00:00 2001 From: liankong Date: Sat, 29 Mar 2025 23:51:49 +0800 Subject: [PATCH 05/10] 2 --- kernel/kpm/kpm.c | 131 +++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 109 insertions(+), 22 deletions(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index 172b4646..f4a0403f 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -478,6 +478,87 @@ static int kpm_rewrite_section_headers(struct kpm_load_info *info) return 0; } +/*----------------------------------------------------------- + * 增强版重定位处理(ARM64) + *----------------------------------------------------------*/ +static int kpm_apply_relocations(struct kpm_module *mod, struct kpm_load_info *info) +{ + int i; + for (i = 0; i < info->ehdr->e_shnum; i++) { + Elf64_Shdr *shdr = &info->sechdrs[i]; + size_t j, num; + Elf64_Rela *relas; + if (shdr->sh_type != SHT_RELA) + continue; + + relas = (Elf64_Rela *)((char *)info->hdr + shdr->sh_offset); + num = shdr->sh_size / sizeof(Elf64_Rela); + + + for (j = 0; j < num; j++) { + Elf64_Rela *rela = &relas[j]; + uint32_t type = ELF64_R_TYPE(rela->r_info); + uint32_t sym_idx = ELF64_R_SYM(rela->r_info); + unsigned long *target = (unsigned long *)(mod->start + rela->r_offset); + + /* 解析符号地址 */ + Elf64_Sym *sym = &info->syms[sym_idx]; + unsigned long sym_addr = 0; + if (ELF64_ST_BIND(sym->st_info) == STB_GLOBAL) { + const char *name = info->strtab + sym->st_name; + sym_addr = kallsyms_lookup_name_fn(name); // 使用动态解析的符号查找函数 + if (!sym_addr) { + printk(KERN_ERR "Symbol %s not found!\n", name); + return -ENOENT; + } + } else { + sym_addr = (unsigned long)mod->start + sym->st_value; + } + + /* 处理重定位类型 */ + switch (type) { + case R_AARCH64_CALL26: + case R_AARCH64_JUMP26: { + int64_t offset = sym_addr - (unsigned long)target - 4; + uint32_t insn; + offset >>= 2; // 指令偏移单位为4字节 + + /* 校验偏移范围(±128MB) */ + if (offset < -0x2000000 || offset > 0x1FFFFFF) { + printk(KERN_ERR "Reloc offset 0x%llx out of range!\n", offset); + return -ERANGE; + } + + insn = le32_to_cpu(*(uint32_t*)target); + insn = (insn & ~0x03FFFFFF) | (offset & 0x03FFFFFF); + *(uint32_t*)target = cpu_to_le32(insn); + break; + } + case R_AARCH64_ADR_PREL_PG_HI21: { + /* 页对齐计算 */ + unsigned long base_page = (sym_addr >> 12) << 12; + unsigned long target_page = ((unsigned long)target >> 12) << 12; + int64_t page_offset = (base_page - target_page) >> 12; + + /* 编码到指令高21位 */ + uint32_t insn = le32_to_cpu(*(uint32_t*)target); + insn &= ~0x1FFFFF; + insn |= (page_offset & 0x1FFFFF) << 3; + *(uint32_t*)target = cpu_to_le32(insn); + break; + } + case R_AARCH64_ABS64: + *target = sym_addr + rela->r_addend; + break; + default: + printk(KERN_ERR "Unsupported relocation type: 0x%x\n", type); + return -EINVAL; + } + } + } + return 0; +} + /*----------------------------------------------------------- * 将各段复制到连续内存区域中 *----------------------------------------------------------*/ @@ -493,38 +574,44 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) int i; unsigned long curr_offset = 0; Elf64_Shdr *shdr; - void *dest; - const char *secname; - /* 分配连续内存(按页对齐) */ - mod->size = ALIGN(mod->size, PAGE_SIZE); - mod->start = module_alloc(mod->size); // 使用内核的 module_alloc 接口 + /* 步骤1:计算总内存需求(按最大对齐) */ + size_t total_size = 0; + for (i = 0; i < info->ehdr->e_shnum; i++) { + shdr = &info->sechdrs[i]; + if (!(shdr->sh_flags & SHF_ALLOC)) continue; + + total_size = ALIGN(total_size, shdr->sh_addralign); + total_size += shdr->sh_size; + } + mod->size = ALIGN(total_size, PAGE_SIZE); + + /* 步骤2:分配对齐内存并设置权限 */ + mod->start = module_alloc(mod->size); if (!mod->start) { - printk(KERN_ERR "ARM64 KPM Loader: Failed to allocate module memory\n"); + printk(KERN_ERR "ARM64 KPM Loader: Failed to allocate 0x%zx bytes\n", mod->size); return -ENOMEM; } memset(mod->start, 0, mod->size); - - /* 设置内存可执行权限(关键修复) */ set_memory_x((unsigned long)mod->start, mod->size >> PAGE_SHIFT); - printk(KERN_INFO "ARM64 KPM Loader: Final section addresses (aligned base=0x%px):\n", mod->start); - - /* 遍历所有段并按对齐要求布局 */ + /* 步骤3:复制段数据并处理对齐 */ for (i = 0; i < info->ehdr->e_shnum; i++) { - shdr = &info->sechdrs[i]; - if (!(shdr->sh_flags & SHF_ALLOC)) - continue; + void *dest; + const char *secname; - /* 按段对齐要求调整偏移 */ + shdr = &info->sechdrs[i]; + if (!(shdr->sh_flags & SHF_ALLOC)) continue; + + /* 动态对齐偏移 */ curr_offset = ALIGN(curr_offset, shdr->sh_addralign); dest = mod->start + curr_offset; - /* 复制段内容(NOBITS 段不复制) */ + /* 复制段内容 */ if (shdr->sh_type != SHT_NOBITS) { memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size); - /* 刷新指令缓存(针对可执行段) */ + /* 刷新指令缓存(关键!) */ if (shdr->sh_flags & SHF_EXECINSTR) { flush_icache_range((unsigned long)dest, (unsigned long)dest + shdr->sh_size); @@ -535,17 +622,17 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) shdr->sh_addr = (unsigned long)dest; curr_offset += shdr->sh_size; - /* 定位关键函数指针 */ + /* 定位关键函数(init/exit) */ secname = info->secstrings + shdr->sh_name; - if (!mod->init && !strcmp(".kpm.init", secname)) { + if (!strcmp(".kpm.init", secname)) { mod->init = (int (*)(const char *, const char *, void *__user))dest; - printk(KERN_DEBUG "Found .kpm.init at 0x%px\n", dest); + printk(KERN_DEBUG "Located .kpm.init at 0x%px\n", dest); } else if (!strcmp(".kpm.exit", secname)) { mod->exit = (void (*)(void *__user))dest; } } - /* 调整元数据指针(基于新基址) */ + /* 步骤4:调整元数据指针 */ if (info->info.base) { unsigned long delta = (unsigned long)mod->start - (unsigned long)info->hdr; mod->info.name = (const char *)((unsigned long)info->info.name + delta); @@ -553,7 +640,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) if (info->info.license) mod->info.license = (const char *)((unsigned long)info->info.license + delta); if (info->info.author) - mod->info.author = (const char *)((unsigned long)info->info.author + delta); + mod->info.author = (const char *)((unsigned long)info->info.author + delta; if (info->info.description) mod->info.description = (const char *)((unsigned long)info->info.description + delta); } From 97c19b07ae80e5bb037d093c597914f6b8d02de2 Mon Sep 17 00:00:00 2001 From: liankong Date: Sun, 30 Mar 2025 00:36:12 +0800 Subject: [PATCH 06/10] =?UTF-8?q?=E4=BF=AE=E5=A4=8D=E9=83=A8=E5=88=86?= =?UTF-8?q?=E5=87=BD=E6=95=B0?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/kpm.c | 182 ++++++++++++++++------------------------------- 1 file changed, 61 insertions(+), 121 deletions(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index f4a0403f..e5b78dff 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -361,19 +361,21 @@ static int kpm_simplify_symbols(struct kpm_module *mod, const struct kpm_load_in return ret; } -/* ARM64 重定位处理:支持 R_AARCH64_RELATIVE 与 R_AARCH64_ABS64 */ +/* ARM64 重定位处理:支持 R_AARCH64_RELATIVE、R_AARCH64_ABS64、R_AARCH64_GLOB_DAT、R_AARCH64_JUMP_SLOT */ static int kpm_apply_relocate_arm64(Elf64_Shdr *sechdrs, const char *strtab, int sym_idx, int rel_idx, struct kpm_module *mod) { Elf64_Shdr *relsec = &sechdrs[rel_idx]; int num = relsec->sh_size / sizeof(Elf64_Rel); - Elf64_Rela *rel = (Elf64_Rela *)((char *)mod->start + relsec->sh_entsize); + Elf64_Rel *rel = (Elf64_Rel *)((char *)mod->start + relsec->sh_offset); // 修正为 sh_offset int i; + for (i = 0; i < num; i++) { unsigned long type = ELF64_R_TYPE(rel[i].r_info); unsigned long *addr = (unsigned long *)(mod->start + rel[i].r_offset); + switch (type) { case R_AARCH64_RELATIVE: - *addr = (unsigned long)mod->start + rel[i].r_addend; + *addr = (unsigned long)mod->start + *(unsigned long *)addr; break; default: printk(KERN_ERR "ARM64 KPM Loader: Unsupported REL relocation type %lu\n", type); @@ -387,12 +389,14 @@ static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, { Elf64_Shdr *relasec = &sechdrs[rela_idx]; int num = relasec->sh_size / sizeof(Elf64_Rela); - Elf64_Rela *rela = (Elf64_Rela *)((char *)mod->start + relasec->sh_entsize); + Elf64_Rela *rela = (Elf64_Rela *)((char *)mod->start + relasec->sh_offset); // 修正为 sh_offset int i; + for (i = 0; i < num; i++) { unsigned long type = ELF64_R_TYPE(rela[i].r_info); unsigned long sym_index = ELF64_R_SYM(rela[i].r_info); unsigned long *addr = (unsigned long *)(mod->start + rela[i].r_offset); + switch (type) { case R_AARCH64_RELATIVE: *addr = (unsigned long)mod->start + rela[i].r_addend; @@ -400,12 +404,22 @@ static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, case R_AARCH64_ABS64: if (sym_index) { Elf64_Sym *sym = (Elf64_Sym *)((char *)mod->start + sechdrs[sym_idx].sh_offset) + sym_index; - *addr = sym->st_value + rela[i].r_addend; + *addr = (unsigned long)mod->start + sym->st_value + rela[i].r_addend; // 修正:确保 st_value 是绝对地址 } else { printk(KERN_ERR "ARM64 KPM Loader: R_AARCH64_ABS64 with zero symbol\n"); return -EINVAL; } break; + case R_AARCH64_GLOB_DAT: + case R_AARCH64_JUMP_SLOT: + if (sym_index) { + Elf64_Sym *sym = (Elf64_Sym *)((char *)mod->start + sechdrs[sym_idx].sh_offset) + sym_index; + *addr = (unsigned long)mod->start + sym->st_value; + } else { + printk(KERN_ERR "ARM64 KPM Loader: R_AARCH64_GLOB_DAT/JUMP_SLOT with zero symbol\n"); + return -EINVAL; + } + break; default: printk(KERN_ERR "ARM64 KPM Loader: Unsupported RELA relocation type %lu\n", type); return -EINVAL; @@ -418,22 +432,36 @@ static int kpm_apply_relocations(struct kpm_module *mod, const struct kpm_load_i { int rc = 0; int i; + for (i = 1; i < info->ehdr->e_shnum; i++) { unsigned int target = info->sechdrs[i].sh_info; - if (target >= info->ehdr->e_shnum) + + if (target >= info->ehdr->e_shnum) { + printk(KERN_ERR "ARM64 KPM Loader: Invalid target section index %u\n", target); + return -EINVAL; + } + + if (!(info->sechdrs[target].sh_flags & SHF_ALLOC)) { + printk(KERN_INFO "ARM64 KPM Loader: Skipping non-allocated section %d\n", i); continue; - if (!(info->sechdrs[target].sh_flags & SHF_ALLOC)) - continue; - if (info->sechdrs[i].sh_type == SHT_REL) + } + + if (info->sechdrs[i].sh_type == SHT_REL) { rc = kpm_apply_relocate_arm64(info->sechdrs, info->strtab, info->index.sym, i, mod); - else if (info->sechdrs[i].sh_type == SHT_RELA) + } else if (info->sechdrs[i].sh_type == SHT_RELA) { rc = kpm_apply_relocate_add_arm64(info->sechdrs, info->strtab, info->index.sym, i, mod); - if (rc < 0) + } + + if (rc < 0) { + printk(KERN_ERR "ARM64 KPM Loader: Relocation failed at section %d, error %d\n", i, rc); break; + } } + return rc; } + /*----------------------------------------------------------- * 符号表与字符串表布局 *----------------------------------------------------------*/ @@ -478,87 +506,6 @@ static int kpm_rewrite_section_headers(struct kpm_load_info *info) return 0; } -/*----------------------------------------------------------- - * 增强版重定位处理(ARM64) - *----------------------------------------------------------*/ -static int kpm_apply_relocations(struct kpm_module *mod, struct kpm_load_info *info) -{ - int i; - for (i = 0; i < info->ehdr->e_shnum; i++) { - Elf64_Shdr *shdr = &info->sechdrs[i]; - size_t j, num; - Elf64_Rela *relas; - if (shdr->sh_type != SHT_RELA) - continue; - - relas = (Elf64_Rela *)((char *)info->hdr + shdr->sh_offset); - num = shdr->sh_size / sizeof(Elf64_Rela); - - - for (j = 0; j < num; j++) { - Elf64_Rela *rela = &relas[j]; - uint32_t type = ELF64_R_TYPE(rela->r_info); - uint32_t sym_idx = ELF64_R_SYM(rela->r_info); - unsigned long *target = (unsigned long *)(mod->start + rela->r_offset); - - /* 解析符号地址 */ - Elf64_Sym *sym = &info->syms[sym_idx]; - unsigned long sym_addr = 0; - if (ELF64_ST_BIND(sym->st_info) == STB_GLOBAL) { - const char *name = info->strtab + sym->st_name; - sym_addr = kallsyms_lookup_name_fn(name); // 使用动态解析的符号查找函数 - if (!sym_addr) { - printk(KERN_ERR "Symbol %s not found!\n", name); - return -ENOENT; - } - } else { - sym_addr = (unsigned long)mod->start + sym->st_value; - } - - /* 处理重定位类型 */ - switch (type) { - case R_AARCH64_CALL26: - case R_AARCH64_JUMP26: { - int64_t offset = sym_addr - (unsigned long)target - 4; - uint32_t insn; - offset >>= 2; // 指令偏移单位为4字节 - - /* 校验偏移范围(±128MB) */ - if (offset < -0x2000000 || offset > 0x1FFFFFF) { - printk(KERN_ERR "Reloc offset 0x%llx out of range!\n", offset); - return -ERANGE; - } - - insn = le32_to_cpu(*(uint32_t*)target); - insn = (insn & ~0x03FFFFFF) | (offset & 0x03FFFFFF); - *(uint32_t*)target = cpu_to_le32(insn); - break; - } - case R_AARCH64_ADR_PREL_PG_HI21: { - /* 页对齐计算 */ - unsigned long base_page = (sym_addr >> 12) << 12; - unsigned long target_page = ((unsigned long)target >> 12) << 12; - int64_t page_offset = (base_page - target_page) >> 12; - - /* 编码到指令高21位 */ - uint32_t insn = le32_to_cpu(*(uint32_t*)target); - insn &= ~0x1FFFFF; - insn |= (page_offset & 0x1FFFFF) << 3; - *(uint32_t*)target = cpu_to_le32(insn); - break; - } - case R_AARCH64_ABS64: - *target = sym_addr + rela->r_addend; - break; - default: - printk(KERN_ERR "Unsupported relocation type: 0x%x\n", type); - return -EINVAL; - } - } - } - return 0; -} - /*----------------------------------------------------------- * 将各段复制到连续内存区域中 *----------------------------------------------------------*/ @@ -574,44 +521,38 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) int i; unsigned long curr_offset = 0; Elf64_Shdr *shdr; + void *dest; + const char *secname; - /* 步骤1:计算总内存需求(按最大对齐) */ - size_t total_size = 0; - for (i = 0; i < info->ehdr->e_shnum; i++) { - shdr = &info->sechdrs[i]; - if (!(shdr->sh_flags & SHF_ALLOC)) continue; - - total_size = ALIGN(total_size, shdr->sh_addralign); - total_size += shdr->sh_size; - } - mod->size = ALIGN(total_size, PAGE_SIZE); - - /* 步骤2:分配对齐内存并设置权限 */ - mod->start = module_alloc(mod->size); + /* 分配连续内存(按页对齐) */ + mod->size = ALIGN(mod->size, PAGE_SIZE); + mod->start = module_alloc(mod->size); // 使用内核的 module_alloc 接口 if (!mod->start) { - printk(KERN_ERR "ARM64 KPM Loader: Failed to allocate 0x%zx bytes\n", mod->size); + printk(KERN_ERR "ARM64 KPM Loader: Failed to allocate module memory\n"); return -ENOMEM; } memset(mod->start, 0, mod->size); + + /* 设置内存可执行权限(关键修复) */ set_memory_x((unsigned long)mod->start, mod->size >> PAGE_SHIFT); - /* 步骤3:复制段数据并处理对齐 */ + printk(KERN_INFO "ARM64 KPM Loader: Final section addresses (aligned base=0x%px):\n", mod->start); + + /* 遍历所有段并按对齐要求布局 */ for (i = 0; i < info->ehdr->e_shnum; i++) { - void *dest; - const char *secname; - shdr = &info->sechdrs[i]; - if (!(shdr->sh_flags & SHF_ALLOC)) continue; + if (!(shdr->sh_flags & SHF_ALLOC)) + continue; - /* 动态对齐偏移 */ + /* 按段对齐要求调整偏移 */ curr_offset = ALIGN(curr_offset, shdr->sh_addralign); dest = mod->start + curr_offset; - /* 复制段内容 */ + /* 复制段内容(NOBITS 段不复制) */ if (shdr->sh_type != SHT_NOBITS) { memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size); - /* 刷新指令缓存(关键!) */ + /* 刷新指令缓存(针对可执行段) */ if (shdr->sh_flags & SHF_EXECINSTR) { flush_icache_range((unsigned long)dest, (unsigned long)dest + shdr->sh_size); @@ -622,17 +563,17 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) shdr->sh_addr = (unsigned long)dest; curr_offset += shdr->sh_size; - /* 定位关键函数(init/exit) */ + /* 定位关键函数指针 */ secname = info->secstrings + shdr->sh_name; - if (!strcmp(".kpm.init", secname)) { + if (!mod->init && !strcmp(".kpm.init", secname)) { mod->init = (int (*)(const char *, const char *, void *__user))dest; - printk(KERN_DEBUG "Located .kpm.init at 0x%px\n", dest); + printk(KERN_DEBUG "Found .kpm.init at 0x%px\n", dest); } else if (!strcmp(".kpm.exit", secname)) { mod->exit = (void (*)(void *__user))dest; } } - /* 步骤4:调整元数据指针 */ + /* 调整元数据指针(基于新基址) */ if (info->info.base) { unsigned long delta = (unsigned long)mod->start - (unsigned long)info->hdr; mod->info.name = (const char *)((unsigned long)info->info.name + delta); @@ -640,7 +581,7 @@ static int kpm_move_module(struct kpm_module *mod, struct kpm_load_info *info) if (info->info.license) mod->info.license = (const char *)((unsigned long)info->info.license + delta); if (info->info.author) - mod->info.author = (const char *)((unsigned long)info->info.author + delta; + mod->info.author = (const char *)((unsigned long)info->info.author + delta); if (info->info.description) mod->info.description = (const char *)((unsigned long)info->info.description + delta); } @@ -1069,5 +1010,4 @@ int sukisu_is_kpm_control_code(unsigned long arg2) { return (arg2 >= CMD_KPM_CONTROL && arg2 <= CMD_KPM_CONTROL_MAX) ? 1 : 0; } -EXPORT_SYMBOL(sukisu_handle_kpm); - +EXPORT_SYMBOL(sukisu_handle_kpm); \ No newline at end of file From 634c9b3c04b47be1cc1cd797e1aacf4b489f438c Mon Sep 17 00:00:00 2001 From: liankong Date: Sun, 30 Mar 2025 00:51:13 +0800 Subject: [PATCH 07/10] 1 --- kernel/kpm/kpm.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index e5b78dff..c34bfc93 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -385,6 +385,13 @@ static int kpm_apply_relocate_arm64(Elf64_Shdr *sechdrs, const char *strtab, int return 0; } +#ifndef R_AARCH64_GLOB_DAT +#define R_AARCH64_GLOB_DAT 1025 /* Set GOT entry to data address */ +#endif +#ifndef R_AARCH64_JUMP_SLOT +#define R_AARCH64_JUMP_SLOT 1026 /* Set GOT entry to code address */ +#endif + static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, int sym_idx, int rela_idx, struct kpm_module *mod) { Elf64_Shdr *relasec = &sechdrs[rela_idx]; From 3bbf8c0d5a55735d1248e4ecb7b93c3ca7935f35 Mon Sep 17 00:00:00 2001 From: liankong Date: Sun, 30 Mar 2025 01:03:55 +0800 Subject: [PATCH 08/10] =?UTF-8?q?=E4=BF=AE=E5=A4=8DR=5FAARCH64=5FNONE?= =?UTF-8?q?=E6=8A=A5=E9=94=99?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/kpm.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index c34bfc93..dd30cc97 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -391,6 +391,9 @@ static int kpm_apply_relocate_arm64(Elf64_Shdr *sechdrs, const char *strtab, int #ifndef R_AARCH64_JUMP_SLOT #define R_AARCH64_JUMP_SLOT 1026 /* Set GOT entry to code address */ #endif +#ifndef R_AARCH64_NONE +#define R_AARCH64_NONE 0 +#endif static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, int sym_idx, int rela_idx, struct kpm_module *mod) { @@ -404,6 +407,10 @@ static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, unsigned long sym_index = ELF64_R_SYM(rela[i].r_info); unsigned long *addr = (unsigned long *)(mod->start + rela[i].r_offset); + if(type == R_AARCH64_NONE) { + continue; + } + switch (type) { case R_AARCH64_RELATIVE: *addr = (unsigned long)mod->start + rela[i].r_addend; From a1aee70467b7f676fdea9e51ed636da8c95a7387 Mon Sep 17 00:00:00 2001 From: liankong Date: Sun, 30 Mar 2025 01:29:50 +0800 Subject: [PATCH 09/10] =?UTF-8?q?=E6=B7=BB=E5=8A=A0=E9=87=8D=E5=AE=9A?= =?UTF-8?q?=E4=BD=8D=E7=B1=BB=E5=9E=8B?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/kpm.c | 228 +++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 203 insertions(+), 25 deletions(-) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index dd30cc97..e4359886 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -391,54 +391,232 @@ static int kpm_apply_relocate_arm64(Elf64_Shdr *sechdrs, const char *strtab, int #ifndef R_AARCH64_JUMP_SLOT #define R_AARCH64_JUMP_SLOT 1026 /* Set GOT entry to code address */ #endif +#ifndef R_ARM_NONE +#define R_ARM_NONE 0 +#endif #ifndef R_AARCH64_NONE -#define R_AARCH64_NONE 0 +#define R_AARCH64_NONE 256 #endif -static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, int sym_idx, int rela_idx, struct kpm_module *mod) +/* 重定位操作类型 */ +typedef enum { + RELOC_OP_ABS, + RELOC_OP_PREL, + RELOC_OP_PAGE +} reloc_op_t; + +/* 指令编码辅助函数 */ +static int reloc_data(reloc_op_t op, void *loc, u64 val, int len) +{ + u64 imm = val; + int shift = 0; + + switch (op) { + case RELOC_OP_ABS: + break; + case RELOC_OP_PREL: + imm -= (u64)loc; + break; + case RELOC_OP_PAGE: + imm = (imm >> 12) - ((u64)loc >> 12); + shift = 12; + break; + default: + return -EINVAL; + } + + switch (len) { + case 16: + *(u16 *)loc = cpu_to_le16(imm >> shift); + break; + case 32: + *(u32 *)loc = cpu_to_le32(imm >> shift); + break; + case 64: + *(u64 *)loc = cpu_to_le64(imm >> shift); + break; + default: + return -EINVAL; + } + + /* 检查溢出 */ + if (imm > (BIT_ULL(len) - 1) << shift) + return -ERANGE; + return 0; +} + +/* MOVW 指令重定位 */ +static int reloc_insn_movw(reloc_op_t op, void *loc, u64 val, int shift, aarch64_insn_imm_type imm_type) +{ + u64 imm = val; + s64 sval; + + switch (op) { + case RELOC_OP_ABS: + break; + case RELOC_OP_PREL: + imm -= (u64)loc; + break; + default: + return -EINVAL; + } + + sval = (s64)imm; + return aarch64_insn_patch_imm(loc, imm_type, sval >> shift); +} + +/* 立即数指令重定位 */ +static int reloc_insn_imm(reloc_op_t op, void *loc, u64 val, int shift, int len, aarch64_insn_imm_type imm_type) +{ + u64 imm = val; + s64 sval; + + switch (op) { + case RELOC_OP_ABS: + break; + case RELOC_OP_PREL: + imm -= (u64)loc; + break; + case RELOC_OP_PAGE: + imm = (imm >> 12) - ((u64)loc >> 12); + shift = 0; + break; + default: + return -EINVAL; + } + + sval = (s64)imm; + return aarch64_insn_patch_imm(loc, imm_type, sval >> shift); +} + +/* 完整的 ARM64 重定位适配 */ +static int kpm_apply_relocate_add_arm64(Elf64_Shdr *sechdrs, const char *strtab, + int sym_idx, int rela_idx, struct kpm_module *mod) { Elf64_Shdr *relasec = &sechdrs[rela_idx]; int num = relasec->sh_size / sizeof(Elf64_Rela); - Elf64_Rela *rela = (Elf64_Rela *)((char *)mod->start + relasec->sh_offset); // 修正为 sh_offset - int i; + Elf64_Rela *rela = (Elf64_Rela *)((char *)mod->start + relasec->sh_offset); + int i, ovf; + bool overflow_check; for (i = 0; i < num; i++) { unsigned long type = ELF64_R_TYPE(rela[i].r_info); unsigned long sym_index = ELF64_R_SYM(rela[i].r_info); - unsigned long *addr = (unsigned long *)(mod->start + rela[i].r_offset); + void *loc = (void *)(mod->start + rela[i].r_offset); + u64 val; + Elf64_Sym *sym; - if(type == R_AARCH64_NONE) { + /* 处理特殊重定位类型 */ + if (type == R_AARCH64_NONE || type == R_ARM_NONE) continue; + + /* 解析符号值 */ + if (sym_index) { + sym = (Elf64_Sym *)((char *)mod->start + sechdrs[sym_idx].sh_offset) + sym_index; + val = sym->st_value + rela[i].r_addend; + + /* 全局符号需通过内核解析 */ + if (ELF64_ST_BIND(sym->st_info) == STB_GLOBAL) { + const char *name = strtab + sym->st_name; + unsigned long addr = kallsyms_lookup_name(name); + if (!addr) { + printk(KERN_ERR "KPM: Symbol %s not found!\n", name); + return -ENOENT; + } + val = addr + rela[i].r_addend; + } else { + val += (u64)mod->start; // 转换为模块内绝对地址 + } + } else { + val = rela[i].r_addend; } + overflow_check = true; + + /* 处理所有重定位类型 */ switch (type) { - case R_AARCH64_RELATIVE: - *addr = (unsigned long)mod->start + rela[i].r_addend; - break; + /* 数据重定位 */ case R_AARCH64_ABS64: - if (sym_index) { - Elf64_Sym *sym = (Elf64_Sym *)((char *)mod->start + sechdrs[sym_idx].sh_offset) + sym_index; - *addr = (unsigned long)mod->start + sym->st_value + rela[i].r_addend; // 修正:确保 st_value 是绝对地址 - } else { - printk(KERN_ERR "ARM64 KPM Loader: R_AARCH64_ABS64 with zero symbol\n"); - return -EINVAL; - } + overflow_check = false; + ovf = reloc_data(RELOC_OP_ABS, loc, val, 64); break; + case R_AARCH64_ABS32: + ovf = reloc_data(RELOC_OP_ABS, loc, val, 32); + break; + case R_AARCH64_ABS16: + ovf = reloc_data(RELOC_OP_ABS, loc, val, 16); + break; + case R_AARCH64_PREL64: + overflow_check = false; + ovf = reloc_data(RELOC_OP_PREL, loc, val, 64); + break; + case R_AARCH64_PREL32: + ovf = reloc_data(RELOC_OP_PREL, loc, val, 32); + break; + case R_AARCH64_PREL16: + ovf = reloc_data(RELOC_OP_PREL, loc, val, 16); + break; + + /* MOVW 指令 */ + case R_AARCH64_MOVW_UABS_G0_NC: + overflow_check = false; + case R_AARCH64_MOVW_UABS_G0: + ovf = reloc_insn_movw(RELOC_OP_ABS, loc, val, 0, AARCH64_INSN_IMM_16); + break; + case R_AARCH64_MOVW_UABS_G1_NC: + overflow_check = false; + case R_AARCH64_MOVW_UABS_G1: + ovf = reloc_insn_movw(RELOC_OP_ABS, loc, val, 16, AARCH64_INSN_IMM_16); + break; + case R_AARCH64_MOVW_UABS_G2_NC: + overflow_check = false; + case R_AARCH64_MOVW_UABS_G2: + ovf = reloc_insn_movw(RELOC_OP_ABS, loc, val, 32, AARCH64_INSN_IMM_16); + break; + case R_AARCH64_MOVW_UABS_G3: + overflow_check = false; + ovf = reloc_insn_movw(RELOC_OP_ABS, loc, val, 48, AARCH64_INSN_IMM_16); + break; + + /* 立即数指令 */ + case R_AARCH64_ADR_PREL_LO21: + ovf = reloc_insn_imm(RELOC_OP_PREL, loc, val, 0, 21, AARCH64_INSN_IMM_ADR); + break; + case R_AARCH64_ADR_PREL_PG_HI21_NC: + overflow_check = false; + case R_AARCH64_ADR_PREL_PG_HI21: + ovf = reloc_insn_imm(RELOC_OP_PAGE, loc, val, 12, 21, AARCH64_INSN_IMM_ADR); + break; + case R_AARCH64_ADD_ABS_LO12_NC: + ovf = reloc_insn_imm(RELOC_OP_ABS, loc, val, 0, 12, AARCH64_INSN_IMM_12); + break; + + /* 跳转指令 */ + case R_AARCH64_JUMP26: + case R_AARCH64_CALL26: + ovf = reloc_insn_imm(RELOC_OP_PREL, loc, val, 2, 26, AARCH64_INSN_IMM_26); + break; + + /* GOT 相关 */ case R_AARCH64_GLOB_DAT: case R_AARCH64_JUMP_SLOT: - if (sym_index) { - Elf64_Sym *sym = (Elf64_Sym *)((char *)mod->start + sechdrs[sym_idx].sh_offset) + sym_index; - *addr = (unsigned long)mod->start + sym->st_value; - } else { - printk(KERN_ERR "ARM64 KPM Loader: R_AARCH64_GLOB_DAT/JUMP_SLOT with zero symbol\n"); - return -EINVAL; - } + *((u64 *)loc) = val; + ovf = 0; break; + default: - printk(KERN_ERR "ARM64 KPM Loader: Unsupported RELA relocation type %lu\n", type); - return -EINVAL; + printk(KERN_ERR "KPM: Unsupported relocation type %lu\n", type); + return -ENOEXEC; + } + + if (overflow_check && ovf == -ERANGE) { + printk(KERN_ERR "KPM: Relocation overflow (type %lu val 0x%llx)\n", type, val); + return -ENOEXEC; + } else if (ovf) { + return ovf; } } + return 0; } From 31852bc2b84a588bbf2cdf22e2ce8f3e46dd2ce5 Mon Sep 17 00:00:00 2001 From: liankong Date: Sun, 30 Mar 2025 01:35:03 +0800 Subject: [PATCH 10/10] =?UTF-8?q?=E4=BF=AE=E5=A4=8D?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- kernel/kpm/kpm.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/kpm/kpm.c b/kernel/kpm/kpm.c index e4359886..b4b8fb11 100644 --- a/kernel/kpm/kpm.c +++ b/kernel/kpm/kpm.c @@ -34,6 +34,7 @@ #include #include #include +#include #include "kpm.h" #include "compact.h"