kprobes.c 11.5 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10
/* arch/sparc64/kernel/kprobes.c
 *
 * Copyright (C) 2004 David S. Miller <davem@davemloft.net>
 */

#include <linux/config.h>
#include <linux/kernel.h>
#include <linux/kprobes.h>
#include <asm/kdebug.h>
#include <asm/signal.h>
11
#include <asm/cacheflush.h>
L
Linus Torvalds 已提交
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

/* We do not have hardware single-stepping on sparc64.
 * So we implement software single-stepping with breakpoint
 * traps.  The top-level scheme is similar to that used
 * in the x86 kprobes implementation.
 *
 * In the kprobe->ainsn.insn[] array we store the original
 * instruction at index zero and a break instruction at
 * index one.
 *
 * When we hit a kprobe we:
 * - Run the pre-handler
 * - Remember "regs->tnpc" and interrupt level stored in
 *   "regs->tstate" so we can restore them later
 * - Disable PIL interrupts
 * - Set regs->tpc to point to kprobe->ainsn.insn[0]
 * - Set regs->tnpc to point to kprobe->ainsn.insn[1]
 * - Mark that we are actively in a kprobe
 *
 * At this point we wait for the second breakpoint at
 * kprobe->ainsn.insn[1] to hit.  When it does we:
 * - Run the post-handler
 * - Set regs->tpc to "remembered" regs->tnpc stored above,
 *   restore the PIL interrupt level in "regs->tstate" as well
 * - Make any adjustments necessary to regs->tnpc in order
 *   to handle relative branches correctly.  See below.
 * - Mark that we are no longer actively in a kprobe.
 */

41 42 43
DEFINE_PER_CPU(struct kprobe *, current_kprobe) = NULL;
DEFINE_PER_CPU(struct kprobe_ctlblk, kprobe_ctlblk);

44
int __kprobes arch_prepare_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
45 46 47 48
{
	return 0;
}

49
void __kprobes arch_copy_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
50 51 52
{
	p->ainsn.insn[0] = *p->addr;
	p->ainsn.insn[1] = BREAKPOINT_INSTRUCTION_2;
53 54 55
	p->opcode = *p->addr;
}

56
void __kprobes arch_arm_kprobe(struct kprobe *p)
57 58 59 60 61
{
	*p->addr = BREAKPOINT_INSTRUCTION;
	flushi(p->addr);
}

62
void __kprobes arch_disarm_kprobe(struct kprobe *p)
63 64 65
{
	*p->addr = p->opcode;
	flushi(p->addr);
L
Linus Torvalds 已提交
66 67
}

68
void __kprobes arch_remove_kprobe(struct kprobe *p)
L
Linus Torvalds 已提交
69 70 71
{
}

72
static inline void save_previous_kprobe(struct kprobe_ctlblk *kcb)
73
{
74 75 76 77
	kcb->prev_kprobe.kp = kprobe_running();
	kcb->prev_kprobe.status = kcb->kprobe_status;
	kcb->prev_kprobe.orig_tnpc = kcb->kprobe_orig_tnpc;
	kcb->prev_kprobe.orig_tstate_pil = kcb->kprobe_orig_tstate_pil;
78 79
}

80
static inline void restore_previous_kprobe(struct kprobe_ctlblk *kcb)
81
{
82 83 84 85
	__get_cpu_var(current_kprobe) = kcb->prev_kprobe.kp;
	kcb->kprobe_status = kcb->prev_kprobe.status;
	kcb->kprobe_orig_tnpc = kcb->prev_kprobe.orig_tnpc;
	kcb->kprobe_orig_tstate_pil = kcb->prev_kprobe.orig_tstate_pil;
86 87
}

88 89
static inline void set_current_kprobe(struct kprobe *p, struct pt_regs *regs,
				struct kprobe_ctlblk *kcb)
L
Linus Torvalds 已提交
90
{
91 92 93
	__get_cpu_var(current_kprobe) = p;
	kcb->kprobe_orig_tnpc = regs->tnpc;
	kcb->kprobe_orig_tstate_pil = (regs->tstate & TSTATE_PIL);
94 95
}

96 97
static inline void prepare_singlestep(struct kprobe *p, struct pt_regs *regs,
			struct kprobe_ctlblk *kcb)
98
{
L
Linus Torvalds 已提交
99 100 101 102 103
	regs->tstate |= TSTATE_PIL;

	/*single step inline, if it a breakpoint instruction*/
	if (p->opcode == BREAKPOINT_INSTRUCTION) {
		regs->tpc = (unsigned long) p->addr;
104
		regs->tnpc = kcb->kprobe_orig_tnpc;
L
Linus Torvalds 已提交
105 106 107 108 109 110
	} else {
		regs->tpc = (unsigned long) &p->ainsn.insn[0];
		regs->tnpc = (unsigned long) &p->ainsn.insn[1];
	}
}

111
static int __kprobes kprobe_handler(struct pt_regs *regs)
L
Linus Torvalds 已提交
112 113 114 115
{
	struct kprobe *p;
	void *addr = (void *) regs->tpc;
	int ret = 0;
116 117 118 119 120 121 122 123
	struct kprobe_ctlblk *kcb;

	/*
	 * We don't want to be preempted for the entire
	 * duration of kprobe processing
	 */
	preempt_disable();
	kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
124 125 126 127

	if (kprobe_running()) {
		p = get_kprobe(addr);
		if (p) {
128
			if (kcb->kprobe_status == KPROBE_HIT_SS) {
L
Linus Torvalds 已提交
129
				regs->tstate = ((regs->tstate & ~TSTATE_PIL) |
130
					kcb->kprobe_orig_tstate_pil);
L
Linus Torvalds 已提交
131 132
				goto no_kprobe;
			}
133 134 135 136 137 138
			/* We have reentered the kprobe_handler(), since
			 * another probe was hit while within the handler.
			 * We here save the original kprobes variables and
			 * just single step on the instruction of the new probe
			 * without calling any user handlers.
			 */
139 140
			save_previous_kprobe(kcb);
			set_current_kprobe(p, regs, kcb);
141
			p->nmissed++;
142 143
			kcb->kprobe_status = KPROBE_REENTER;
			prepare_singlestep(p, regs, kcb);
144
			return 1;
L
Linus Torvalds 已提交
145
		} else {
146
			p = __get_cpu_var(current_kprobe);
L
Linus Torvalds 已提交
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168
			if (p->break_handler && p->break_handler(p, regs))
				goto ss_probe;
		}
		goto no_kprobe;
	}

	p = get_kprobe(addr);
	if (!p) {
		if (*(u32 *)addr != BREAKPOINT_INSTRUCTION) {
			/*
			 * The breakpoint instruction was removed right
			 * after we hit it.  Another cpu has removed
			 * either a probepoint or a debugger breakpoint
			 * at this address.  In either case, no further
			 * handling of this interrupt is appropriate.
			 */
			ret = 1;
		}
		/* Not one of ours: let kernel handle it */
		goto no_kprobe;
	}

169 170
	set_current_kprobe(p, regs, kcb);
	kcb->kprobe_status = KPROBE_HIT_ACTIVE;
L
Linus Torvalds 已提交
171 172 173 174
	if (p->pre_handler && p->pre_handler(p, regs))
		return 1;

ss_probe:
175 176
	prepare_singlestep(p, regs, kcb);
	kcb->kprobe_status = KPROBE_HIT_SS;
L
Linus Torvalds 已提交
177 178 179
	return 1;

no_kprobe:
180
	preempt_enable_no_resched();
L
Linus Torvalds 已提交
181 182 183 184 185 186 187 188 189
	return ret;
}

/* If INSN is a relative control transfer instruction,
 * return the corrected branch destination value.
 *
 * The original INSN location was REAL_PC, it actually
 * executed at PC and produced destination address NPC.
 */
190 191 192
static unsigned long __kprobes relbranch_fixup(u32 insn, unsigned long real_pc,
					       unsigned long pc,
					       unsigned long npc)
L
Linus Torvalds 已提交
193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216
{
	/* Branch not taken, no mods necessary.  */
	if (npc == pc + 0x4UL)
		return real_pc + 0x4UL;

	/* The three cases are call, branch w/prediction,
	 * and traditional branch.
	 */
	if ((insn & 0xc0000000) == 0x40000000 ||
	    (insn & 0xc1c00000) == 0x00400000 ||
	    (insn & 0xc1c00000) == 0x00800000) {
		/* The instruction did all the work for us
		 * already, just apply the offset to the correct
		 * instruction location.
		 */
		return (real_pc + (npc - pc));
	}

	return real_pc + 0x4UL;
}

/* If INSN is an instruction which writes it's PC location
 * into a destination register, fix that up.
 */
217 218
static void __kprobes retpc_fixup(struct pt_regs *regs, u32 insn,
				  unsigned long real_pc)
L
Linus Torvalds 已提交
219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257
{
	unsigned long *slot = NULL;

	/* Simplest cast is call, which always uses %o7 */
	if ((insn & 0xc0000000) == 0x40000000) {
		slot = &regs->u_regs[UREG_I7];
	}

	/* Jmpl encodes the register inside of the opcode */
	if ((insn & 0xc1f80000) == 0x81c00000) {
		unsigned long rd = ((insn >> 25) & 0x1f);

		if (rd <= 15) {
			slot = &regs->u_regs[rd];
		} else {
			/* Hard case, it goes onto the stack. */
			flushw_all();

			rd -= 16;
			slot = (unsigned long *)
				(regs->u_regs[UREG_FP] + STACK_BIAS);
			slot += rd;
		}
	}
	if (slot != NULL)
		*slot = real_pc;
}

/*
 * Called after single-stepping.  p->addr is the address of the
 * instruction whose first byte has been replaced by the breakpoint
 * instruction.  To avoid the SMP problems that can occur when we
 * temporarily put back the original opcode to single-step, we
 * single-stepped a copy of the instruction.  The address of this
 * copy is p->ainsn.insn.
 *
 * This function prepares to return from the post-single-step
 * breakpoint trap.
 */
258 259
static void __kprobes resume_execution(struct kprobe *p,
		struct pt_regs *regs, struct kprobe_ctlblk *kcb)
L
Linus Torvalds 已提交
260 261 262
{
	u32 insn = p->ainsn.insn[0];

263
	regs->tpc = kcb->kprobe_orig_tnpc;
L
Linus Torvalds 已提交
264 265 266 267 268 269 270
	regs->tnpc = relbranch_fixup(insn,
				     (unsigned long) p->addr,
				     (unsigned long) &p->ainsn.insn[0],
				     regs->tnpc);
	retpc_fixup(regs, insn, (unsigned long) p->addr);

	regs->tstate = ((regs->tstate & ~TSTATE_PIL) |
271
			kcb->kprobe_orig_tstate_pil);
L
Linus Torvalds 已提交
272 273 274 275
}

static inline int post_kprobe_handler(struct pt_regs *regs)
{
276 277 278 279
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (!cur)
L
Linus Torvalds 已提交
280 281
		return 0;

282 283 284
	if ((kcb->kprobe_status != KPROBE_REENTER) && cur->post_handler) {
		kcb->kprobe_status = KPROBE_HIT_SSDONE;
		cur->post_handler(cur, regs, 0);
285
	}
L
Linus Torvalds 已提交
286

287
	resume_execution(cur, regs, kcb);
L
Linus Torvalds 已提交
288

289
	/*Restore back the original saved kprobes variables and continue. */
290 291
	if (kcb->kprobe_status == KPROBE_REENTER) {
		restore_previous_kprobe(kcb);
292 293
		goto out;
	}
294
	reset_current_kprobe();
295
out:
L
Linus Torvalds 已提交
296 297 298 299 300 301 302
	preempt_enable_no_resched();

	return 1;
}

static inline int kprobe_fault_handler(struct pt_regs *regs, int trapnr)
{
303 304 305 306
	struct kprobe *cur = kprobe_running();
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();

	if (cur->fault_handler && cur->fault_handler(cur, regs, trapnr))
L
Linus Torvalds 已提交
307 308
		return 1;

309 310
	if (kcb->kprobe_status & KPROBE_HIT_SS) {
		resume_execution(cur, regs, kcb);
L
Linus Torvalds 已提交
311

312
		reset_current_kprobe();
L
Linus Torvalds 已提交
313 314 315 316 317 318 319 320
		preempt_enable_no_resched();
	}
	return 0;
}

/*
 * Wrapper routine to for handling exceptions.
 */
321 322
int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
				       unsigned long val, void *data)
L
Linus Torvalds 已提交
323 324
{
	struct die_args *args = (struct die_args *)data;
325 326
	int ret = NOTIFY_DONE;

L
Linus Torvalds 已提交
327 328 329
	switch (val) {
	case DIE_DEBUG:
		if (kprobe_handler(args->regs))
330
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
331 332 333
		break;
	case DIE_DEBUG_2:
		if (post_kprobe_handler(args->regs))
334
			ret = NOTIFY_STOP;
L
Linus Torvalds 已提交
335 336 337
		break;
	case DIE_GPF:
	case DIE_PAGE_FAULT:
338 339
		/* kprobe_running() needs smp_processor_id() */
		preempt_disable();
L
Linus Torvalds 已提交
340 341
		if (kprobe_running() &&
		    kprobe_fault_handler(args->regs, args->trapnr))
342
			ret = NOTIFY_STOP;
343
		preempt_enable();
L
Linus Torvalds 已提交
344 345 346 347
		break;
	default:
		break;
	}
348
	return ret;
L
Linus Torvalds 已提交
349 350
}

351 352
asmlinkage void __kprobes kprobe_trap(unsigned long trap_level,
				      struct pt_regs *regs)
L
Linus Torvalds 已提交
353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371
{
	BUG_ON(trap_level != 0x170 && trap_level != 0x171);

	if (user_mode(regs)) {
		local_irq_enable();
		bad_trap(regs, trap_level);
		return;
	}

	/* trap_level == 0x170 --> ta 0x70
	 * trap_level == 0x171 --> ta 0x71
	 */
	if (notify_die((trap_level == 0x170) ? DIE_DEBUG : DIE_DEBUG_2,
		       (trap_level == 0x170) ? "debug" : "debug_2",
		       regs, 0, trap_level, SIGTRAP) != NOTIFY_STOP)
		bad_trap(regs, trap_level);
}

/* Jprobes support.  */
372
int __kprobes setjmp_pre_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
373 374
{
	struct jprobe *jp = container_of(p, struct jprobe, kp);
375
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
376

377 378
	kcb->jprobe_saved_regs_location = regs;
	memcpy(&(kcb->jprobe_saved_regs), regs, sizeof(*regs));
L
Linus Torvalds 已提交
379 380 381 382 383

	/* Save a whole stack frame, this gets arguments
	 * pushed onto the stack after using up all the
	 * arg registers.
	 */
384
	memcpy(&(kcb->jprobe_saved_stack),
L
Linus Torvalds 已提交
385
	       (char *) (regs->u_regs[UREG_FP] + STACK_BIAS),
386
	       sizeof(kcb->jprobe_saved_stack));
L
Linus Torvalds 已提交
387 388 389 390 391 392 393 394

	regs->tpc  = (unsigned long) jp->entry;
	regs->tnpc = ((unsigned long) jp->entry) + 0x4UL;
	regs->tstate |= TSTATE_PIL;

	return 1;
}

395
void __kprobes jprobe_return(void)
L
Linus Torvalds 已提交
396 397 398 399 400 401 402 403 404 405 406
{
	__asm__ __volatile__(
		".globl	jprobe_return_trap_instruction\n"
"jprobe_return_trap_instruction:\n\t"
		"ta 0x70");
}

extern void jprobe_return_trap_instruction(void);

extern void __show_regs(struct pt_regs * regs);

407
int __kprobes longjmp_break_handler(struct kprobe *p, struct pt_regs *regs)
L
Linus Torvalds 已提交
408 409
{
	u32 *addr = (u32 *) regs->tpc;
410
	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
L
Linus Torvalds 已提交
411 412

	if (addr == (u32 *) jprobe_return_trap_instruction) {
413
		if (kcb->jprobe_saved_regs_location != regs) {
L
Linus Torvalds 已提交
414 415
			printk("JPROBE: Current regs (%p) does not match "
			       "saved regs (%p).\n",
416
			       regs, kcb->jprobe_saved_regs_location);
L
Linus Torvalds 已提交
417
			printk("JPROBE: Saved registers\n");
418
			__show_regs(kcb->jprobe_saved_regs_location);
L
Linus Torvalds 已提交
419 420 421 422 423 424 425 426
			printk("JPROBE: Current registers\n");
			__show_regs(regs);
			BUG();
		}
		/* Restore old register state.  Do pt_regs
		 * first so that UREG_FP is the original one for
		 * the stack frame restore.
		 */
427
		memcpy(regs, &(kcb->jprobe_saved_regs), sizeof(*regs));
L
Linus Torvalds 已提交
428 429

		memcpy((char *) (regs->u_regs[UREG_FP] + STACK_BIAS),
430 431
		       &(kcb->jprobe_saved_stack),
		       sizeof(kcb->jprobe_saved_stack));
L
Linus Torvalds 已提交
432

433
		preempt_enable_no_resched();
L
Linus Torvalds 已提交
434 435 436 437
		return 1;
	}
	return 0;
}
438

439 440 441 442 443
/* architecture specific initialization */
int arch_init_kprobes(void)
{
	return 0;
}