kprobes.c 18.6 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
/*
 *  Kernel Probes (KProbes)
 *  arch/i386/kernel/kprobes.c
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 * Copyright (C) IBM Corporation, 2002, 2004
 *
 * 2002-Oct	Created by Vamsi Krishna S <vamsi_krishna@in.ibm.com> Kernel
 *		Probes initial implementation ( includes contributions from
 *		Rusty Russell).
 * 2004-July	Suparna Bhattacharya <suparna@in.ibm.com> added jumper probes
 *		interface to access function arguments.
26 27 28
 * 2005-May	Hien Nguyen <hien@us.ibm.com>, Jim Keniston
 *		<jkenisto@us.ibm.com> and Prasanna S Panchamukhi
 *		<prasanna@in.ibm.com> added function-return probes.
L
Linus Torvalds 已提交
29 30 31 32 33 34
 */

#include <linux/config.h>
#include <linux/kprobes.h>
#include <linux/ptrace.h>
#include <linux/preempt.h>
35
#include <asm/cacheflush.h>
L
Linus Torvalds 已提交
36 37 38 39 40
#include <asm/kdebug.h>
#include <asm/desc.h>

void jprobe_return_end(void);

41 42 43
DEFINE_PER_CPU(struct kprobe *, current_kprobe) = NULL;
DEFINE_PER_CPU(struct kprobe_ctlblk, kprobe_ctlblk);

M
Masami Hiramatsu 已提交
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
/* insert a jmp code */
static inline void set_jmp_op(void *from, void *to)
{
	struct __arch_jmp_op {
		char op;
		long raddr;
	} __attribute__((packed)) *jop;
	jop = (struct __arch_jmp_op *)from;
	jop->raddr = (long)(to) - ((long)(from) + 5);
	jop->op = RELATIVEJUMP_INSTRUCTION;
}

/*
 * returns non-zero if opcodes can be boosted.
 */
static inline int can_boost(kprobe_opcode_t opcode)
{
	switch (opcode & 0xf0 ) {
	case 0x70:
		return 0; /* can't boost conditional jump */
	case 0x90:
		/* can't boost call and pushf */
		return opcode != 0x9a && opcode != 0x9c;
	case 0xc0:
		/* can't boost undefined opcodes and soft-interruptions */
		return (0xc1 < opcode && opcode < 0xc6) ||
			(0xc7 < opcode && opcode < 0xcc) || opcode == 0xcf;
	case 0xd0:
		/* can boost AA* and XLAT */
		return (opcode == 0xd4 || opcode == 0xd5 || opcode == 0xd7);
	case 0xe0:
		/* can boost in/out and (may be) jmps */
		return (0xe3 < opcode && opcode != 0xe8);
	case 0xf0:
		/* clear and set flags can be boost */
		return (opcode == 0xf5 || (0xf7 < opcode && opcode < 0xfe));
	default:
		/* currently, can't boost 2 bytes opcodes */
		return opcode != 0x0f;
	}
}


L
Linus Torvalds 已提交
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
/*
 * returns non-zero if opcode modifies the interrupt flag.
 */
static inline int is_IF_modifier(kprobe_opcode_t opcode)
{
	switch (opcode) {
	case 0xfa:		/* cli */
	case 0xfb:		/* sti */
	case 0xcf:		/* iret/iretd */
	case 0x9d:		/* popf/popfd */
		return 1;
	}
	return 0;
}

102
int __kprobes arch_prepare_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
103
{
104 105 106 107 108
	/* insn: must be on special executable page on i386. */
	p->ainsn.insn = get_insn_slot();
	if (!p->ainsn.insn)
		return -ENOMEM;

L
Linus Torvalds 已提交
109
	memcpy(p->ainsn.insn, p->addr, MAX_INSN_SIZE * sizeof(kprobe_opcode_t));
110
	p->opcode = *p->addr;
M
Masami Hiramatsu 已提交
111 112 113 114 115
	if (can_boost(p->opcode)) {
		p->ainsn.boostable = 0;
	} else {
		p->ainsn.boostable = -1;
	}
116
	return 0;
L
Linus Torvalds 已提交
117 118
}

119
void __kprobes arch_arm_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
120
{
121 122 123
	*p->addr = BREAKPOINT_INSTRUCTION;
	flush_icache_range((unsigned long) p->addr,
			   (unsigned long) p->addr + sizeof(kprobe_opcode_t));
L
Linus Torvalds 已提交
124 125
}

126
void __kprobes arch_disarm_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
127 128
{
	*p->addr = p->opcode;
129 130 131 132
	flush_icache_range((unsigned long) p->addr,
			   (unsigned long) p->addr + sizeof(kprobe_opcode_t));
}

133 134
void __kprobes arch_remove_kprobe(struct kprobe *p)
{
I
Ingo Molnar 已提交
135
	mutex_lock(&kprobe_mutex);
136
	free_insn_slot(p->ainsn.insn);
I
Ingo Molnar 已提交
137
	mutex_unlock(&kprobe_mutex);
138 139
}

140
static inline void save_previous_kprobe(struct kprobe_ctlblk *kcb)
141
{
142 143 144 145
	kcb->prev_kprobe.kp = kprobe_running();
	kcb->prev_kprobe.status = kcb->kprobe_status;
	kcb->prev_kprobe.old_eflags = kcb->kprobe_old_eflags;
	kcb->prev_kprobe.saved_eflags = kcb->kprobe_saved_eflags;
146 147
}

148
static inline void restore_previous_kprobe(struct kprobe_ctlblk *kcb)
149
{
150 151 152 153
	__get_cpu_var(current_kprobe) = kcb->prev_kprobe.kp;
	kcb->kprobe_status = kcb->prev_kprobe.status;
	kcb->kprobe_old_eflags = kcb->prev_kprobe.old_eflags;
	kcb->kprobe_saved_eflags = kcb->prev_kprobe.saved_eflags;
154 155
}

156 157
static inline void set_current_kprobe(struct kprobe *p, struct pt_regs *regs,
				struct kprobe_ctlblk *kcb)
158
{
159 160
	__get_cpu_var(current_kprobe) = p;
	kcb->kprobe_saved_eflags = kcb->kprobe_old_eflags
161 162
		= (regs->eflags & (TF_MASK | IF_MASK));
	if (is_IF_modifier(p->opcode))
163
		kcb->kprobe_saved_eflags &= ~IF_MASK;
164 165
}

L
Linus Torvalds 已提交
166 167 168 169 170 171 172 173
static inline void prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
{
	regs->eflags |= TF_MASK;
	regs->eflags &= ~IF_MASK;
	/*single step inline if the instruction is an int3*/
	if (p->opcode == BREAKPOINT_INSTRUCTION)
		regs->eip = (unsigned long)p->addr;
	else
174
		regs->eip = (unsigned long)p->ainsn.insn;
L
Linus Torvalds 已提交
175 176
}

177
/* Called with kretprobe_lock held */
178 179
void __kprobes arch_prepare_kretprobe(struct kretprobe *rp,
				      struct pt_regs *regs)
180 181
{
	unsigned long *sara = (unsigned long *)&regs->esp;
182 183 184 185 186 187
        struct kretprobe_instance *ri;

        if ((ri = get_free_rp_inst(rp)) != NULL) {
                ri->rp = rp;
                ri->task = current;
		ri->ret_addr = (kprobe_opcode_t *) *sara;
188 189 190 191

		/* Replace the return addr with trampoline addr */
		*sara = (unsigned long) &kretprobe_trampoline;

192 193 194 195
                add_rp_inst(ri);
        } else {
                rp->nmissed++;
        }
196 197
}

L
Linus Torvalds 已提交
198 199 200 201
/*
 * Interrupts are disabled on entry as trap3 is an interrupt gate and they
 * remain disabled thorough out this function.
 */
202
static int __kprobes kprobe_handler(struct pt_regs *regs)
L
Linus Torvalds 已提交
203 204 205 206 207
{
	struct kprobe *p;
	int ret = 0;
	kprobe_opcode_t *addr = NULL;
	unsigned long *lp;
208
	struct kprobe_ctlblk *kcb;
M
Masami Hiramatsu 已提交
209 210 211
#ifdef CONFIG_PREEMPT
	unsigned pre_preempt_count = preempt_count();
#endif /* CONFIG_PREEMPT */
212 213 214 215 216 217 218

	/*
	 * We don't want to be preempted for the entire
	 * duration of kprobe processing
	 */
	preempt_disable();
	kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234

	/* Check if the application is using LDT entry for its code segment and
	 * calculate the address by reading the base address from the LDT entry.
	 */
	if ((regs->xcs & 4) && (current->mm)) {
		lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8)
					+ (char *) current->mm->context.ldt);
		addr = (kprobe_opcode_t *) (get_desc_base(lp) + regs->eip -
						sizeof(kprobe_opcode_t));
	} else {
		addr = (kprobe_opcode_t *)(regs->eip - sizeof(kprobe_opcode_t));
	}
	/* Check we're not actually recursing */
	if (kprobe_running()) {
		p = get_kprobe(addr);
		if (p) {
235
			if (kcb->kprobe_status == KPROBE_HIT_SS &&
236
				*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
L
Linus Torvalds 已提交
237
				regs->eflags &= ~TF_MASK;
238
				regs->eflags |= kcb->kprobe_saved_eflags;
L
Linus Torvalds 已提交
239 240
				goto no_kprobe;
			}
241 242 243 244 245 246
			/* We have reentered the kprobe_handler(), since
			 * another probe was hit while within the handler.
			 * We here save the original kprobes variables and
			 * just single step on the instruction of the new probe
			 * without calling any user handlers.
			 */
247 248
			save_previous_kprobe(kcb);
			set_current_kprobe(p, regs, kcb);
249
			kprobes_inc_nmissed_count(p);
250
			prepare_singlestep(p, regs);
251
			kcb->kprobe_status = KPROBE_REENTER;
252
			return 1;
L
Linus Torvalds 已提交
253
		} else {
254 255 256 257 258 259 260 261 262 263 264 265 266
			if (regs->eflags & VM_MASK) {
			/* We are in virtual-8086 mode. Return 0 */
				goto no_kprobe;
			}
			if (*addr != BREAKPOINT_INSTRUCTION) {
			/* The breakpoint instruction was removed by
			 * another cpu right after we hit, no further
			 * handling of this interrupt is appropriate
			 */
				regs->eip -= sizeof(kprobe_opcode_t);
				ret = 1;
				goto no_kprobe;
			}
267
			p = __get_cpu_var(current_kprobe);
L
Linus Torvalds 已提交
268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288
			if (p->break_handler && p->break_handler(p, regs)) {
				goto ss_probe;
			}
		}
		goto no_kprobe;
	}

	p = get_kprobe(addr);
	if (!p) {
		if (regs->eflags & VM_MASK) {
			/* We are in virtual-8086 mode. Return 0 */
			goto no_kprobe;
		}

		if (*addr != BREAKPOINT_INSTRUCTION) {
			/*
			 * The breakpoint instruction was removed right
			 * after we hit it.  Another cpu has removed
			 * either a probepoint or a debugger breakpoint
			 * at this address.  In either case, no further
			 * handling of this interrupt is appropriate.
289 290
			 * Back up over the (now missing) int3 and run
			 * the original instruction.
L
Linus Torvalds 已提交
291
			 */
292
			regs->eip -= sizeof(kprobe_opcode_t);
L
Linus Torvalds 已提交
293 294 295 296 297 298
			ret = 1;
		}
		/* Not one of ours: let kernel handle it */
		goto no_kprobe;
	}

299 300
	set_current_kprobe(p, regs, kcb);
	kcb->kprobe_status = KPROBE_HIT_ACTIVE;
L
Linus Torvalds 已提交
301 302 303 304 305

	if (p->pre_handler && p->pre_handler(p, regs))
		/* handler has already set things up, so skip ss setup */
		return 1;

M
Masami Hiramatsu 已提交
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320
	if (p->ainsn.boostable == 1 &&
#ifdef CONFIG_PREEMPT
	    !(pre_preempt_count) && /*
				       * This enables booster when the direct
				       * execution path aren't preempted.
				       */
#endif /* CONFIG_PREEMPT */
	    !p->post_handler && !p->break_handler ) {
		/* Boost up -- we can execute copied instructions directly */
		reset_current_kprobe();
		regs->eip = (unsigned long)p->ainsn.insn;
		preempt_enable_no_resched();
		return 1;
	}

L
Linus Torvalds 已提交
321 322
ss_probe:
	prepare_singlestep(p, regs);
323
	kcb->kprobe_status = KPROBE_HIT_SS;
L
Linus Torvalds 已提交
324 325 326
	return 1;

no_kprobe:
327
	preempt_enable_no_resched();
L
Linus Torvalds 已提交
328 329 330
	return ret;
}

331 332 333 334 335 336 337 338 339 340 341 342 343 344 345
/*
 * For function-return probes, init_kprobes() establishes a probepoint
 * here. When a retprobed function returns, this probe is hit and
 * trampoline_probe_handler() runs, calling the kretprobe's handler.
 */
 void kretprobe_trampoline_holder(void)
 {
 	asm volatile (  ".global kretprobe_trampoline\n"
 			"kretprobe_trampoline: \n"
 			"nop\n");
 }

/*
 * Called when we hit the probe point at kretprobe_trampoline
 */
346
int __kprobes trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs)
347
{
348 349 350
        struct kretprobe_instance *ri = NULL;
        struct hlist_head *head;
        struct hlist_node *node, *tmp;
351
	unsigned long flags, orig_ret_address = 0;
352
	unsigned long trampoline_address =(unsigned long)&kretprobe_trampoline;
353

354
	spin_lock_irqsave(&kretprobe_lock, flags);
355
        head = kretprobe_inst_table_head(current);
356

357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378
	/*
	 * It is possible to have multiple instances associated with a given
	 * task either because an multiple functions in the call path
	 * have a return probe installed on them, and/or more then one return
	 * return probe was registered for a target function.
	 *
	 * We can handle this because:
	 *     - instances are always inserted at the head of the list
	 *     - when multiple return probes are registered for the same
         *       function, the first instance's ret_addr will point to the
	 *       real return address, and all the rest will point to
	 *       kretprobe_trampoline
	 */
	hlist_for_each_entry_safe(ri, node, tmp, head, hlist) {
                if (ri->task != current)
			/* another task is sharing our hash bucket */
                        continue;

		if (ri->rp && ri->rp->handler)
			ri->rp->handler(ri, regs);

		orig_ret_address = (unsigned long)ri->ret_addr;
379
		recycle_rp_inst(ri);
380 381 382 383 384 385 386 387

		if (orig_ret_address != trampoline_address)
			/*
			 * This is the real return address. Any other
			 * instances associated with this task are for
			 * other calls deeper on the call stack
			 */
			break;
388
	}
389 390 391 392

	BUG_ON(!orig_ret_address || (orig_ret_address == trampoline_address));
	regs->eip = orig_ret_address;

393
	reset_current_kprobe();
394
	spin_unlock_irqrestore(&kretprobe_lock, flags);
395 396
	preempt_enable_no_resched();

397 398
	/*
	 * By returning a non-zero value, we are telling
399 400
	 * kprobe_handler() that we don't want the post_handler
	 * to run (and have re-enabled preemption)
401
	 */
402
        return 1;
403 404
}

L
Linus Torvalds 已提交
405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
/*
 * Called after single-stepping.  p->addr is the address of the
 * instruction whose first byte has been replaced by the "int 3"
 * instruction.  To avoid the SMP problems that can occur when we
 * temporarily put back the original opcode to single-step, we
 * single-stepped a copy of the instruction.  The address of this
 * copy is p->ainsn.insn.
 *
 * This function prepares to return from the post-single-step
 * interrupt.  We have to fix up the stack as follows:
 *
 * 0) Except in the case of absolute or indirect jump or call instructions,
 * the new eip is relative to the copied instruction.  We need to make
 * it relative to the original instruction.
 *
 * 1) If the single-stepped instruction was pushfl, then the TF and IF
 * flags are set in the just-pushed eflags, and may need to be cleared.
 *
 * 2) If the single-stepped instruction was a call, the return address
 * that is atop the stack is the address following the copied instruction.
 * We need to make it the address following the original instruction.
M
Masami Hiramatsu 已提交
426 427
 *
 * This function also checks instruction size for preparing direct execution.
L
Linus Torvalds 已提交
428
 */
429 430
static void __kprobes resume_execution(struct kprobe *p,
		struct pt_regs *regs, struct kprobe_ctlblk *kcb)
L
Linus Torvalds 已提交
431 432
{
	unsigned long *tos = (unsigned long *)&regs->esp;
433
	unsigned long copy_eip = (unsigned long)p->ainsn.insn;
L
Linus Torvalds 已提交
434 435
	unsigned long orig_eip = (unsigned long)p->addr;

436
	regs->eflags &= ~TF_MASK;
L
Linus Torvalds 已提交
437 438 439
	switch (p->ainsn.insn[0]) {
	case 0x9c:		/* pushfl */
		*tos &= ~(TF_MASK | IF_MASK);
440
		*tos |= kcb->kprobe_old_eflags;
L
Linus Torvalds 已提交
441
		break;
442 443 444 445
	case 0xc3:		/* ret/lret */
	case 0xcb:
	case 0xc2:
	case 0xca:
446 447
	case 0xea:		/* jmp absolute -- eip is correct */
		/* eip is already adjusted, no more changes required */
M
Masami Hiramatsu 已提交
448
		p->ainsn.boostable = 1;
449
		goto no_change;
L
Linus Torvalds 已提交
450 451 452 453 454 455
	case 0xe8:		/* call relative - Fix return addr */
		*tos = orig_eip + (*tos - copy_eip);
		break;
	case 0xff:
		if ((p->ainsn.insn[1] & 0x30) == 0x10) {
			/* call absolute, indirect */
M
Masami Hiramatsu 已提交
456 457 458 459
			/*
			 * Fix return addr; eip is correct.
			 * But this is not boostable
			 */
L
Linus Torvalds 已提交
460
			*tos = orig_eip + (*tos - copy_eip);
461
			goto no_change;
L
Linus Torvalds 已提交
462 463
		} else if (((p->ainsn.insn[1] & 0x31) == 0x20) ||	/* jmp near, absolute indirect */
			   ((p->ainsn.insn[1] & 0x31) == 0x21)) {	/* jmp far, absolute indirect */
M
Masami Hiramatsu 已提交
464 465
			/* eip is correct. And this is boostable */
			p->ainsn.boostable = 1;
466
			goto no_change;
L
Linus Torvalds 已提交
467 468 469 470 471
		}
	default:
		break;
	}

M
Masami Hiramatsu 已提交
472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
	if (p->ainsn.boostable == 0) {
		if ((regs->eip > copy_eip) &&
		    (regs->eip - copy_eip) + 5 < MAX_INSN_SIZE) {
			/*
			 * These instructions can be executed directly if it
			 * jumps back to correct address.
			 */
			set_jmp_op((void *)regs->eip,
				   (void *)orig_eip + (regs->eip - copy_eip));
			p->ainsn.boostable = 1;
		} else {
			p->ainsn.boostable = -1;
		}
	}

487 488 489 490
	regs->eip = orig_eip + (regs->eip - copy_eip);

no_change:
	return;
L
Linus Torvalds 已提交
491 492 493 494
}

/*
 * Interrupts are disabled on entry as trap1 is an interrupt gate and they
495
 * remain disabled thoroughout this function.
L
Linus Torvalds 已提交
496 497 498
 */
static inline int post_kprobe_handler(struct pt_regs *regs)
{
499 500 501 502
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (!cur)
L
Linus Torvalds 已提交
503 504
		return 0;

505 506 507
	if ((kcb->kprobe_status != KPROBE_REENTER) && cur->post_handler) {
		kcb->kprobe_status = KPROBE_HIT_SSDONE;
		cur->post_handler(cur, regs, 0);
508
	}
L
Linus Torvalds 已提交
509

510 511
	resume_execution(cur, regs, kcb);
	regs->eflags |= kcb->kprobe_saved_eflags;
L
Linus Torvalds 已提交
512

513
	/*Restore back the original saved kprobes variables and continue. */
514 515
	if (kcb->kprobe_status == KPROBE_REENTER) {
		restore_previous_kprobe(kcb);
516 517
		goto out;
	}
518
	reset_current_kprobe();
519
out:
L
Linus Torvalds 已提交
520 521 522 523 524 525 526 527 528 529 530 531 532 533 534
	preempt_enable_no_resched();

	/*
	 * if somebody else is singlestepping across a probe point, eflags
	 * will have TF set, in which case, continue the remaining processing
	 * of do_debug, as if this is not a probe hit.
	 */
	if (regs->eflags & TF_MASK)
		return 0;

	return 1;
}

static inline int kprobe_fault_handler(struct pt_regs *regs, int trapnr)
{
535 536 537 538
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (cur->fault_handler && cur->fault_handler(cur, regs, trapnr))
L
Linus Torvalds 已提交
539 540
		return 1;

541 542 543
	if (kcb->kprobe_status & KPROBE_HIT_SS) {
		resume_execution(cur, regs, kcb);
		regs->eflags |= kcb->kprobe_old_eflags;
L
Linus Torvalds 已提交
544

545
		reset_current_kprobe();
L
Linus Torvalds 已提交
546 547 548 549 550 551 552 553
		preempt_enable_no_resched();
	}
	return 0;
}

/*
 * Wrapper routine to for handling exceptions.
 */
554 555
int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
				       unsigned long val, void *data)
L
Linus Torvalds 已提交
556 557
{
	struct die_args *args = (struct die_args *)data;
558 559
	int ret = NOTIFY_DONE;

L
Linus Torvalds 已提交
560 561 562
	switch (val) {
	case DIE_INT3:
		if (kprobe_handler(args->regs))
563
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
564 565 566
		break;
	case DIE_DEBUG:
		if (post_kprobe_handler(args->regs))
567
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
568 569 570
		break;
	case DIE_GPF:
	case DIE_PAGE_FAULT:
571 572
		/* kprobe_running() needs smp_processor_id() */
		preempt_disable();
L
Linus Torvalds 已提交
573 574
		if (kprobe_running() &&
		    kprobe_fault_handler(args->regs, args->trapnr))
575
			ret = NOTIFY_STOP;
576
		preempt_enable();
L
Linus Torvalds 已提交
577 578 579 580
		break;
	default:
		break;
	}
581
	return ret;
L
Linus Torvalds 已提交
582 583
}

584
int __kprobes setjmp_pre_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
585 586 587
{
	struct jprobe *jp = container_of(p, struct jprobe, kp);
	unsigned long addr;
588
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
589

590 591 592
	kcb->jprobe_saved_regs = *regs;
	kcb->jprobe_saved_esp = &regs->esp;
	addr = (unsigned long)(kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
593 594 595 596 597 598 599 600

	/*
	 * TBD: As Linus pointed out, gcc assumes that the callee
	 * owns the argument space and could overwrite it, e.g.
	 * tailcall optimization. So, to be absolutely safe
	 * we also save and restore enough stack bytes to cover
	 * the argument area.
	 */
601 602
	memcpy(kcb->jprobes_stack, (kprobe_opcode_t *)addr,
			MIN_STACK_SIZE(addr));
L
Linus Torvalds 已提交
603 604 605 606 607
	regs->eflags &= ~IF_MASK;
	regs->eip = (unsigned long)(jp->entry);
	return 1;
}

608
void __kprobes jprobe_return(void)
L
Linus Torvalds 已提交
609
{
610 611
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

L
Linus Torvalds 已提交
612 613 614 615 616
	asm volatile ("       xchgl   %%ebx,%%esp     \n"
		      "       int3			\n"
		      "       .globl jprobe_return_end	\n"
		      "       jprobe_return_end:	\n"
		      "       nop			\n"::"b"
617
		      (kcb->jprobe_saved_esp):"memory");
L
Linus Torvalds 已提交
618 619
}

620
int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
621
{
622
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
623
	u8 *addr = (u8 *) (regs->eip - 1);
624
	unsigned long stack_addr = (unsigned long)(kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
625 626 627
	struct jprobe *jp = container_of(p, struct jprobe, kp);

	if ((addr > (u8 *) jprobe_return) && (addr < (u8 *) jprobe_return_end)) {
628
		if (&regs->esp != kcb->jprobe_saved_esp) {
L
Linus Torvalds 已提交
629
			struct pt_regs *saved_regs =
630 631
			    container_of(kcb->jprobe_saved_esp,
					    struct pt_regs, esp);
L
Linus Torvalds 已提交
632
			printk("current esp %p does not match saved esp %p\n",
633
			       &regs->esp, kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
634 635 636 637 638 639
			printk("Saved registers for jprobe %p\n", jp);
			show_registers(saved_regs);
			printk("Current registers\n");
			show_registers(regs);
			BUG();
		}
640 641
		*regs = kcb->jprobe_saved_regs;
		memcpy((kprobe_opcode_t *) stack_addr, kcb->jprobes_stack,
L
Linus Torvalds 已提交
642
		       MIN_STACK_SIZE(stack_addr));
643
		preempt_enable_no_resched();
L
Linus Torvalds 已提交
644 645 646 647
		return 1;
	}
	return 0;
}
648 649 650 651 652 653

static struct kprobe trampoline_p = {
	.addr = (kprobe_opcode_t *) &kretprobe_trampoline,
	.pre_handler = trampoline_probe_handler
};

654
int __init arch_init_kprobes(void)
655 656 657
{
	return register_kprobe(&trampoline_p);
}