kprobes.c 18.9 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
/*
 *  Kernel Probes (KProbes)
 *  arch/i386/kernel/kprobes.c
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 * Copyright (C) IBM Corporation, 2002, 2004
 *
 * 2002-Oct	Created by Vamsi Krishna S <vamsi_krishna@in.ibm.com> Kernel
 *		Probes initial implementation ( includes contributions from
 *		Rusty Russell).
 * 2004-July	Suparna Bhattacharya <suparna@in.ibm.com> added jumper probes
 *		interface to access function arguments.
26 27 28
 * 2005-May	Hien Nguyen <hien@us.ibm.com>, Jim Keniston
 *		<jkenisto@us.ibm.com> and Prasanna S Panchamukhi
 *		<prasanna@in.ibm.com> added function-return probes.
L
Linus Torvalds 已提交
29 30 31 32 33 34
 */

#include <linux/config.h>
#include <linux/kprobes.h>
#include <linux/ptrace.h>
#include <linux/preempt.h>
35
#include <asm/cacheflush.h>
L
Linus Torvalds 已提交
36 37 38 39 40
#include <asm/kdebug.h>
#include <asm/desc.h>

void jprobe_return_end(void);

41 42 43
DEFINE_PER_CPU(struct kprobe *, current_kprobe) = NULL;
DEFINE_PER_CPU(struct kprobe_ctlblk, kprobe_ctlblk);

M
Masami Hiramatsu 已提交
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
/* insert a jmp code */
static inline void set_jmp_op(void *from, void *to)
{
	struct __arch_jmp_op {
		char op;
		long raddr;
	} __attribute__((packed)) *jop;
	jop = (struct __arch_jmp_op *)from;
	jop->raddr = (long)(to) - ((long)(from) + 5);
	jop->op = RELATIVEJUMP_INSTRUCTION;
}

/*
 * returns non-zero if opcodes can be boosted.
 */
static inline int can_boost(kprobe_opcode_t opcode)
{
	switch (opcode & 0xf0 ) {
	case 0x70:
		return 0; /* can't boost conditional jump */
	case 0x90:
		/* can't boost call and pushf */
		return opcode != 0x9a && opcode != 0x9c;
	case 0xc0:
		/* can't boost undefined opcodes and soft-interruptions */
		return (0xc1 < opcode && opcode < 0xc6) ||
			(0xc7 < opcode && opcode < 0xcc) || opcode == 0xcf;
	case 0xd0:
		/* can boost AA* and XLAT */
		return (opcode == 0xd4 || opcode == 0xd5 || opcode == 0xd7);
	case 0xe0:
		/* can boost in/out and (may be) jmps */
		return (0xe3 < opcode && opcode != 0xe8);
	case 0xf0:
		/* clear and set flags can be boost */
		return (opcode == 0xf5 || (0xf7 < opcode && opcode < 0xfe));
	default:
		/* currently, can't boost 2 bytes opcodes */
		return opcode != 0x0f;
	}
}


L
Linus Torvalds 已提交
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
/*
 * returns non-zero if opcode modifies the interrupt flag.
 */
static inline int is_IF_modifier(kprobe_opcode_t opcode)
{
	switch (opcode) {
	case 0xfa:		/* cli */
	case 0xfb:		/* sti */
	case 0xcf:		/* iret/iretd */
	case 0x9d:		/* popf/popfd */
		return 1;
	}
	return 0;
}

102
int __kprobes arch_prepare_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
103
{
104 105 106 107 108
	/* insn: must be on special executable page on i386. */
	p->ainsn.insn = get_insn_slot();
	if (!p->ainsn.insn)
		return -ENOMEM;

L
Linus Torvalds 已提交
109
	memcpy(p->ainsn.insn, p->addr, MAX_INSN_SIZE * sizeof(kprobe_opcode_t));
110
	p->opcode = *p->addr;
M
Masami Hiramatsu 已提交
111 112 113 114 115
	if (can_boost(p->opcode)) {
		p->ainsn.boostable = 0;
	} else {
		p->ainsn.boostable = -1;
	}
116
	return 0;
L
Linus Torvalds 已提交
117 118
}

119
void __kprobes arch_arm_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
120
{
121 122 123
	*p->addr = BREAKPOINT_INSTRUCTION;
	flush_icache_range((unsigned long) p->addr,
			   (unsigned long) p->addr + sizeof(kprobe_opcode_t));
L
Linus Torvalds 已提交
124 125
}

126
void __kprobes arch_disarm_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
127 128
{
	*p->addr = p->opcode;
129 130 131 132
	flush_icache_range((unsigned long) p->addr,
			   (unsigned long) p->addr + sizeof(kprobe_opcode_t));
}

133 134
void __kprobes arch_remove_kprobe(struct kprobe *p)
{
I
Ingo Molnar 已提交
135
	mutex_lock(&kprobe_mutex);
136
	free_insn_slot(p->ainsn.insn);
I
Ingo Molnar 已提交
137
	mutex_unlock(&kprobe_mutex);
138 139
}

140
static inline void save_previous_kprobe(struct kprobe_ctlblk *kcb)
141
{
142 143 144 145
	kcb->prev_kprobe.kp = kprobe_running();
	kcb->prev_kprobe.status = kcb->kprobe_status;
	kcb->prev_kprobe.old_eflags = kcb->kprobe_old_eflags;
	kcb->prev_kprobe.saved_eflags = kcb->kprobe_saved_eflags;
146 147
}

148
static inline void restore_previous_kprobe(struct kprobe_ctlblk *kcb)
149
{
150 151 152 153
	__get_cpu_var(current_kprobe) = kcb->prev_kprobe.kp;
	kcb->kprobe_status = kcb->prev_kprobe.status;
	kcb->kprobe_old_eflags = kcb->prev_kprobe.old_eflags;
	kcb->kprobe_saved_eflags = kcb->prev_kprobe.saved_eflags;
154 155
}

156 157
static inline void set_current_kprobe(struct kprobe *p, struct pt_regs *regs,
				struct kprobe_ctlblk *kcb)
158
{
159 160
	__get_cpu_var(current_kprobe) = p;
	kcb->kprobe_saved_eflags = kcb->kprobe_old_eflags
161 162
		= (regs->eflags & (TF_MASK | IF_MASK));
	if (is_IF_modifier(p->opcode))
163
		kcb->kprobe_saved_eflags &= ~IF_MASK;
164 165
}

L
Linus Torvalds 已提交
166 167 168 169 170 171 172 173
static inline void prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
{
	regs->eflags |= TF_MASK;
	regs->eflags &= ~IF_MASK;
	/*single step inline if the instruction is an int3*/
	if (p->opcode == BREAKPOINT_INSTRUCTION)
		regs->eip = (unsigned long)p->addr;
	else
174
		regs->eip = (unsigned long)p->ainsn.insn;
L
Linus Torvalds 已提交
175 176
}

177
/* Called with kretprobe_lock held */
178 179
void __kprobes arch_prepare_kretprobe(struct kretprobe *rp,
				      struct pt_regs *regs)
180 181
{
	unsigned long *sara = (unsigned long *)&regs->esp;
182 183 184 185 186 187
        struct kretprobe_instance *ri;

        if ((ri = get_free_rp_inst(rp)) != NULL) {
                ri->rp = rp;
                ri->task = current;
		ri->ret_addr = (kprobe_opcode_t *) *sara;
188 189 190 191

		/* Replace the return addr with trampoline addr */
		*sara = (unsigned long) &kretprobe_trampoline;

192 193 194 195
                add_rp_inst(ri);
        } else {
                rp->nmissed++;
        }
196 197
}

L
Linus Torvalds 已提交
198 199 200 201
/*
 * Interrupts are disabled on entry as trap3 is an interrupt gate and they
 * remain disabled thorough out this function.
 */
202
static int __kprobes kprobe_handler(struct pt_regs *regs)
L
Linus Torvalds 已提交
203 204 205 206 207
{
	struct kprobe *p;
	int ret = 0;
	kprobe_opcode_t *addr = NULL;
	unsigned long *lp;
208
	struct kprobe_ctlblk *kcb;
M
Masami Hiramatsu 已提交
209 210 211
#ifdef CONFIG_PREEMPT
	unsigned pre_preempt_count = preempt_count();
#endif /* CONFIG_PREEMPT */
212 213 214 215 216 217 218

	/*
	 * We don't want to be preempted for the entire
	 * duration of kprobe processing
	 */
	preempt_disable();
	kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234

	/* Check if the application is using LDT entry for its code segment and
	 * calculate the address by reading the base address from the LDT entry.
	 */
	if ((regs->xcs & 4) && (current->mm)) {
		lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8)
					+ (char *) current->mm->context.ldt);
		addr = (kprobe_opcode_t *) (get_desc_base(lp) + regs->eip -
						sizeof(kprobe_opcode_t));
	} else {
		addr = (kprobe_opcode_t *)(regs->eip - sizeof(kprobe_opcode_t));
	}
	/* Check we're not actually recursing */
	if (kprobe_running()) {
		p = get_kprobe(addr);
		if (p) {
235
			if (kcb->kprobe_status == KPROBE_HIT_SS &&
236
				*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
L
Linus Torvalds 已提交
237
				regs->eflags &= ~TF_MASK;
238
				regs->eflags |= kcb->kprobe_saved_eflags;
L
Linus Torvalds 已提交
239 240
				goto no_kprobe;
			}
241 242 243 244 245 246
			/* We have reentered the kprobe_handler(), since
			 * another probe was hit while within the handler.
			 * We here save the original kprobes variables and
			 * just single step on the instruction of the new probe
			 * without calling any user handlers.
			 */
247 248
			save_previous_kprobe(kcb);
			set_current_kprobe(p, regs, kcb);
249
			kprobes_inc_nmissed_count(p);
250
			prepare_singlestep(p, regs);
251
			kcb->kprobe_status = KPROBE_REENTER;
252
			return 1;
L
Linus Torvalds 已提交
253
		} else {
254 255 256 257 258 259 260 261 262 263 264 265 266
			if (regs->eflags & VM_MASK) {
			/* We are in virtual-8086 mode. Return 0 */
				goto no_kprobe;
			}
			if (*addr != BREAKPOINT_INSTRUCTION) {
			/* The breakpoint instruction was removed by
			 * another cpu right after we hit, no further
			 * handling of this interrupt is appropriate
			 */
				regs->eip -= sizeof(kprobe_opcode_t);
				ret = 1;
				goto no_kprobe;
			}
267
			p = __get_cpu_var(current_kprobe);
L
Linus Torvalds 已提交
268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288
			if (p->break_handler && p->break_handler(p, regs)) {
				goto ss_probe;
			}
		}
		goto no_kprobe;
	}

	p = get_kprobe(addr);
	if (!p) {
		if (regs->eflags & VM_MASK) {
			/* We are in virtual-8086 mode. Return 0 */
			goto no_kprobe;
		}

		if (*addr != BREAKPOINT_INSTRUCTION) {
			/*
			 * The breakpoint instruction was removed right
			 * after we hit it.  Another cpu has removed
			 * either a probepoint or a debugger breakpoint
			 * at this address.  In either case, no further
			 * handling of this interrupt is appropriate.
289 290
			 * Back up over the (now missing) int3 and run
			 * the original instruction.
L
Linus Torvalds 已提交
291
			 */
292
			regs->eip -= sizeof(kprobe_opcode_t);
L
Linus Torvalds 已提交
293 294 295 296 297 298
			ret = 1;
		}
		/* Not one of ours: let kernel handle it */
		goto no_kprobe;
	}

299 300
	set_current_kprobe(p, regs, kcb);
	kcb->kprobe_status = KPROBE_HIT_ACTIVE;
L
Linus Torvalds 已提交
301 302 303 304 305

	if (p->pre_handler && p->pre_handler(p, regs))
		/* handler has already set things up, so skip ss setup */
		return 1;

M
Masami Hiramatsu 已提交
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320
	if (p->ainsn.boostable == 1 &&
#ifdef CONFIG_PREEMPT
	    !(pre_preempt_count) && /*
				       * This enables booster when the direct
				       * execution path aren't preempted.
				       */
#endif /* CONFIG_PREEMPT */
	    !p->post_handler && !p->break_handler ) {
		/* Boost up -- we can execute copied instructions directly */
		reset_current_kprobe();
		regs->eip = (unsigned long)p->ainsn.insn;
		preempt_enable_no_resched();
		return 1;
	}

L
Linus Torvalds 已提交
321 322
ss_probe:
	prepare_singlestep(p, regs);
323
	kcb->kprobe_status = KPROBE_HIT_SS;
L
Linus Torvalds 已提交
324 325 326
	return 1;

no_kprobe:
327
	preempt_enable_no_resched();
L
Linus Torvalds 已提交
328 329 330
	return ret;
}

331 332 333 334 335
/*
 * For function-return probes, init_kprobes() establishes a probepoint
 * here. When a retprobed function returns, this probe is hit and
 * trampoline_probe_handler() runs, calling the kretprobe's handler.
 */
336
 void __kprobes kretprobe_trampoline_holder(void)
337
 {
338
	asm volatile ( ".global kretprobe_trampoline\n"
339
 			"kretprobe_trampoline: \n"
340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368
			"	pushf\n"
			/* skip cs, eip, orig_eax, es, ds */
			"	subl $20, %esp\n"
			"	pushl %eax\n"
			"	pushl %ebp\n"
			"	pushl %edi\n"
			"	pushl %esi\n"
			"	pushl %edx\n"
			"	pushl %ecx\n"
			"	pushl %ebx\n"
			"	movl %esp, %eax\n"
			"	call trampoline_handler\n"
			/* move eflags to cs */
			"	movl 48(%esp), %edx\n"
			"	movl %edx, 44(%esp)\n"
			/* save true return address on eflags */
			"	movl %eax, 48(%esp)\n"
			"	popl %ebx\n"
			"	popl %ecx\n"
			"	popl %edx\n"
			"	popl %esi\n"
			"	popl %edi\n"
			"	popl %ebp\n"
			"	popl %eax\n"
			/* skip eip, orig_eax, es, ds */
			"	addl $16, %esp\n"
			"	popf\n"
			"	ret\n");
}
369 370

/*
371
 * Called from kretprobe_trampoline
372
 */
373
fastcall void *__kprobes trampoline_handler(struct pt_regs *regs)
374
{
375 376 377
        struct kretprobe_instance *ri = NULL;
        struct hlist_head *head;
        struct hlist_node *node, *tmp;
378
	unsigned long flags, orig_ret_address = 0;
379
	unsigned long trampoline_address =(unsigned long)&kretprobe_trampoline;
380

381
	spin_lock_irqsave(&kretprobe_lock, flags);
382
        head = kretprobe_inst_table_head(current);
383

384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401
	/*
	 * It is possible to have multiple instances associated with a given
	 * task either because an multiple functions in the call path
	 * have a return probe installed on them, and/or more then one return
	 * return probe was registered for a target function.
	 *
	 * We can handle this because:
	 *     - instances are always inserted at the head of the list
	 *     - when multiple return probes are registered for the same
         *       function, the first instance's ret_addr will point to the
	 *       real return address, and all the rest will point to
	 *       kretprobe_trampoline
	 */
	hlist_for_each_entry_safe(ri, node, tmp, head, hlist) {
                if (ri->task != current)
			/* another task is sharing our hash bucket */
                        continue;

402 403
		if (ri->rp && ri->rp->handler){
			__get_cpu_var(current_kprobe) = &ri->rp->kp;
404
			ri->rp->handler(ri, regs);
405 406
			__get_cpu_var(current_kprobe) = NULL;
		}
407 408

		orig_ret_address = (unsigned long)ri->ret_addr;
409
		recycle_rp_inst(ri);
410 411 412 413 414 415 416 417

		if (orig_ret_address != trampoline_address)
			/*
			 * This is the real return address. Any other
			 * instances associated with this task are for
			 * other calls deeper on the call stack
			 */
			break;
418
	}
419 420 421

	BUG_ON(!orig_ret_address || (orig_ret_address == trampoline_address));

422
	spin_unlock_irqrestore(&kretprobe_lock, flags);
423

424
	return (void*)orig_ret_address;
425 426
}

L
Linus Torvalds 已提交
427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
/*
 * Called after single-stepping.  p->addr is the address of the
 * instruction whose first byte has been replaced by the "int 3"
 * instruction.  To avoid the SMP problems that can occur when we
 * temporarily put back the original opcode to single-step, we
 * single-stepped a copy of the instruction.  The address of this
 * copy is p->ainsn.insn.
 *
 * This function prepares to return from the post-single-step
 * interrupt.  We have to fix up the stack as follows:
 *
 * 0) Except in the case of absolute or indirect jump or call instructions,
 * the new eip is relative to the copied instruction.  We need to make
 * it relative to the original instruction.
 *
 * 1) If the single-stepped instruction was pushfl, then the TF and IF
 * flags are set in the just-pushed eflags, and may need to be cleared.
 *
 * 2) If the single-stepped instruction was a call, the return address
 * that is atop the stack is the address following the copied instruction.
 * We need to make it the address following the original instruction.
M
Masami Hiramatsu 已提交
448 449
 *
 * This function also checks instruction size for preparing direct execution.
L
Linus Torvalds 已提交
450
 */
451 452
static void __kprobes resume_execution(struct kprobe *p,
		struct pt_regs *regs, struct kprobe_ctlblk *kcb)
L
Linus Torvalds 已提交
453 454
{
	unsigned long *tos = (unsigned long *)&regs->esp;
455
	unsigned long copy_eip = (unsigned long)p->ainsn.insn;
L
Linus Torvalds 已提交
456 457
	unsigned long orig_eip = (unsigned long)p->addr;

458
	regs->eflags &= ~TF_MASK;
L
Linus Torvalds 已提交
459 460 461
	switch (p->ainsn.insn[0]) {
	case 0x9c:		/* pushfl */
		*tos &= ~(TF_MASK | IF_MASK);
462
		*tos |= kcb->kprobe_old_eflags;
L
Linus Torvalds 已提交
463
		break;
464 465 466 467
	case 0xc3:		/* ret/lret */
	case 0xcb:
	case 0xc2:
	case 0xca:
468 469
	case 0xea:		/* jmp absolute -- eip is correct */
		/* eip is already adjusted, no more changes required */
M
Masami Hiramatsu 已提交
470
		p->ainsn.boostable = 1;
471
		goto no_change;
L
Linus Torvalds 已提交
472 473 474 475 476 477
	case 0xe8:		/* call relative - Fix return addr */
		*tos = orig_eip + (*tos - copy_eip);
		break;
	case 0xff:
		if ((p->ainsn.insn[1] & 0x30) == 0x10) {
			/* call absolute, indirect */
M
Masami Hiramatsu 已提交
478 479 480 481
			/*
			 * Fix return addr; eip is correct.
			 * But this is not boostable
			 */
L
Linus Torvalds 已提交
482
			*tos = orig_eip + (*tos - copy_eip);
483
			goto no_change;
L
Linus Torvalds 已提交
484 485
		} else if (((p->ainsn.insn[1] & 0x31) == 0x20) ||	/* jmp near, absolute indirect */
			   ((p->ainsn.insn[1] & 0x31) == 0x21)) {	/* jmp far, absolute indirect */
M
Masami Hiramatsu 已提交
486 487
			/* eip is correct. And this is boostable */
			p->ainsn.boostable = 1;
488
			goto no_change;
L
Linus Torvalds 已提交
489 490 491 492 493
		}
	default:
		break;
	}

M
Masami Hiramatsu 已提交
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508
	if (p->ainsn.boostable == 0) {
		if ((regs->eip > copy_eip) &&
		    (regs->eip - copy_eip) + 5 < MAX_INSN_SIZE) {
			/*
			 * These instructions can be executed directly if it
			 * jumps back to correct address.
			 */
			set_jmp_op((void *)regs->eip,
				   (void *)orig_eip + (regs->eip - copy_eip));
			p->ainsn.boostable = 1;
		} else {
			p->ainsn.boostable = -1;
		}
	}

509 510 511 512
	regs->eip = orig_eip + (regs->eip - copy_eip);

no_change:
	return;
L
Linus Torvalds 已提交
513 514 515 516
}

/*
 * Interrupts are disabled on entry as trap1 is an interrupt gate and they
517
 * remain disabled thoroughout this function.
L
Linus Torvalds 已提交
518 519 520
 */
static inline int post_kprobe_handler(struct pt_regs *regs)
{
521 522 523 524
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (!cur)
L
Linus Torvalds 已提交
525 526
		return 0;

527 528 529
	if ((kcb->kprobe_status != KPROBE_REENTER) && cur->post_handler) {
		kcb->kprobe_status = KPROBE_HIT_SSDONE;
		cur->post_handler(cur, regs, 0);
530
	}
L
Linus Torvalds 已提交
531

532 533
	resume_execution(cur, regs, kcb);
	regs->eflags |= kcb->kprobe_saved_eflags;
L
Linus Torvalds 已提交
534

535
	/*Restore back the original saved kprobes variables and continue. */
536 537
	if (kcb->kprobe_status == KPROBE_REENTER) {
		restore_previous_kprobe(kcb);
538 539
		goto out;
	}
540
	reset_current_kprobe();
541
out:
L
Linus Torvalds 已提交
542 543 544 545 546 547 548 549 550 551 552 553 554 555 556
	preempt_enable_no_resched();

	/*
	 * if somebody else is singlestepping across a probe point, eflags
	 * will have TF set, in which case, continue the remaining processing
	 * of do_debug, as if this is not a probe hit.
	 */
	if (regs->eflags & TF_MASK)
		return 0;

	return 1;
}

static inline int kprobe_fault_handler(struct pt_regs *regs, int trapnr)
{
557 558 559 560
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (cur->fault_handler && cur->fault_handler(cur, regs, trapnr))
L
Linus Torvalds 已提交
561 562
		return 1;

563 564 565
	if (kcb->kprobe_status & KPROBE_HIT_SS) {
		resume_execution(cur, regs, kcb);
		regs->eflags |= kcb->kprobe_old_eflags;
L
Linus Torvalds 已提交
566

567
		reset_current_kprobe();
L
Linus Torvalds 已提交
568 569 570 571 572 573 574 575
		preempt_enable_no_resched();
	}
	return 0;
}

/*
 * Wrapper routine to for handling exceptions.
 */
576 577
int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
				       unsigned long val, void *data)
L
Linus Torvalds 已提交
578 579
{
	struct die_args *args = (struct die_args *)data;
580 581
	int ret = NOTIFY_DONE;

L
Linus Torvalds 已提交
582 583 584
	switch (val) {
	case DIE_INT3:
		if (kprobe_handler(args->regs))
585
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
586 587 588
		break;
	case DIE_DEBUG:
		if (post_kprobe_handler(args->regs))
589
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
590 591 592
		break;
	case DIE_GPF:
	case DIE_PAGE_FAULT:
593 594
		/* kprobe_running() needs smp_processor_id() */
		preempt_disable();
L
Linus Torvalds 已提交
595 596
		if (kprobe_running() &&
		    kprobe_fault_handler(args->regs, args->trapnr))
597
			ret = NOTIFY_STOP;
598
		preempt_enable();
L
Linus Torvalds 已提交
599 600 601 602
		break;
	default:
		break;
	}
603
	return ret;
L
Linus Torvalds 已提交
604 605
}

606
int __kprobes setjmp_pre_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
607 608 609
{
	struct jprobe *jp = container_of(p, struct jprobe, kp);
	unsigned long addr;
610
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
611

612 613 614
	kcb->jprobe_saved_regs = *regs;
	kcb->jprobe_saved_esp = &regs->esp;
	addr = (unsigned long)(kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
615 616 617 618 619 620 621 622

	/*
	 * TBD: As Linus pointed out, gcc assumes that the callee
	 * owns the argument space and could overwrite it, e.g.
	 * tailcall optimization. So, to be absolutely safe
	 * we also save and restore enough stack bytes to cover
	 * the argument area.
	 */
623 624
	memcpy(kcb->jprobes_stack, (kprobe_opcode_t *)addr,
			MIN_STACK_SIZE(addr));
L
Linus Torvalds 已提交
625 626 627 628 629
	regs->eflags &= ~IF_MASK;
	regs->eip = (unsigned long)(jp->entry);
	return 1;
}

630
void __kprobes jprobe_return(void)
L
Linus Torvalds 已提交
631
{
632 633
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

L
Linus Torvalds 已提交
634 635 636 637 638
	asm volatile ("       xchgl   %%ebx,%%esp     \n"
		      "       int3			\n"
		      "       .globl jprobe_return_end	\n"
		      "       jprobe_return_end:	\n"
		      "       nop			\n"::"b"
639
		      (kcb->jprobe_saved_esp):"memory");
L
Linus Torvalds 已提交
640 641
}

642
int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
643
{
644
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
645
	u8 *addr = (u8 *) (regs->eip - 1);
646
	unsigned long stack_addr = (unsigned long)(kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
647 648 649
	struct jprobe *jp = container_of(p, struct jprobe, kp);

	if ((addr > (u8 *) jprobe_return) && (addr < (u8 *) jprobe_return_end)) {
650
		if (&regs->esp != kcb->jprobe_saved_esp) {
L
Linus Torvalds 已提交
651
			struct pt_regs *saved_regs =
652 653
			    container_of(kcb->jprobe_saved_esp,
					    struct pt_regs, esp);
L
Linus Torvalds 已提交
654
			printk("current esp %p does not match saved esp %p\n",
655
			       &regs->esp, kcb->jprobe_saved_esp);
L
Linus Torvalds 已提交
656 657 658 659 660 661
			printk("Saved registers for jprobe %p\n", jp);
			show_registers(saved_regs);
			printk("Current registers\n");
			show_registers(regs);
			BUG();
		}
662 663
		*regs = kcb->jprobe_saved_regs;
		memcpy((kprobe_opcode_t *) stack_addr, kcb->jprobes_stack,
L
Linus Torvalds 已提交
664
		       MIN_STACK_SIZE(stack_addr));
665
		preempt_enable_no_resched();
L
Linus Torvalds 已提交
666 667 668 669
		return 1;
	}
	return 0;
}
670

671
int __init arch_init_kprobes(void)
672
{
673
	return 0;
674
}