int __kprobes arch_trampoline_kprobe(struct kprobe *p)
{ if (*p->addr == BREAKPOINT_INSTRUCTION) return 1;
return 0;
}
/** * If an illegal slot instruction exception occurs for an address * containing a kprobe, remove the probe. * * Returns 0 if the exception was handled successfully, 1 otherwise.
*/ int __kprobes kprobe_handle_illslot(unsignedlong pc)
{ struct kprobe *p = get_kprobe((kprobe_opcode_t *) pc + 1);
if (p != NULL) {
printk("Warning: removing kprobe from delay slot: 0x%.8x\n",
(unsignedint)pc + 2);
unregister_kprobe(p); return 0;
}
/* * Singlestep is implemented by disabling the current kprobe and setting one * on the next instruction, following branches. Two probes are set if the * branch is conditional.
*/ staticvoid __kprobes prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
{
__this_cpu_write(saved_current_opcode.addr, (kprobe_opcode_t *)regs->pc);
/* Called with kretprobe_lock held */ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri, struct pt_regs *regs)
{
ri->ret_addr = (kprobe_opcode_t *) regs->pr;
ri->fp = NULL;
/* Replace the return addr with trampoline addr */
regs->pr = (unsignedlong)__kretprobe_trampoline;
}
staticint __kprobes kprobe_handler(struct pt_regs *regs)
{ struct kprobe *p; int ret = 0;
kprobe_opcode_t *addr = NULL; struct kprobe_ctlblk *kcb;
/* * We don't want to be preempted for the entire * duration of kprobe processing
*/
preempt_disable();
kcb = get_kprobe_ctlblk();
addr = (kprobe_opcode_t *) (regs->pc);
/* Check we're not actually recursing */ if (kprobe_running()) {
p = get_kprobe(addr); if (p) { if (kcb->kprobe_status == KPROBE_HIT_SS &&
*p->ainsn.insn == BREAKPOINT_INSTRUCTION) { goto no_kprobe;
} /* We have reentered the kprobe_handler(), since * another probe was hit while within the handler. * We here save the original kprobes variables and * just single step on the instruction of the new probe * without calling any user handlers.
*/
save_previous_kprobe(kcb);
set_current_kprobe(p, regs, kcb);
kprobes_inc_nmissed_count(p);
prepare_singlestep(p, regs);
kcb->kprobe_status = KPROBE_REENTER; return 1;
} goto no_kprobe;
}
p = get_kprobe(addr); if (!p) { /* Not one of ours: let kernel handle it */ if (*addr != BREAKPOINT_INSTRUCTION) { /* * The breakpoint instruction was removed right * after we hit it. Another cpu has removed * either a probepoint or a debugger breakpoint * at this address. In either case, no further * handling of this interrupt is appropriate.
*/
ret = 1;
}
if (p->pre_handler && p->pre_handler(p, regs)) { /* handler has already set things up, so skip ss setup */
reset_current_kprobe();
preempt_enable_no_resched(); return 1;
}
/* * For function-return probes, init_kprobes() establishes a probepoint * here. When a retprobed function returns, this probe is hit and * trampoline_probe_handler() runs, calling the kretprobe's handler.
*/ staticvoid __used kretprobe_trampoline_holder(void)
{ asmvolatile (".globl __kretprobe_trampoline\n" "__kretprobe_trampoline:\n\t" "nop\n");
}
/* * Called when we hit the probe point at __kretprobe_trampoline
*/ staticint __kprobes trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs)
{
regs->pc = __kretprobe_trampoline_handler(regs, NULL);
p = this_cpu_ptr(&saved_next_opcode2); if (p->addr) {
arch_disarm_kprobe(p);
p->addr = NULL;
p->opcode = 0;
}
}
/* Restore back the original saved kprobes variables and continue. */ if (kcb->kprobe_status == KPROBE_REENTER) {
restore_previous_kprobe(kcb); goto out;
}
switch (kcb->kprobe_status) { case KPROBE_HIT_SS: case KPROBE_REENTER: /* * We are here because the instruction being single * stepped caused a page fault. We reset the current * kprobe, point the pc back to the probe address * and allow the page fault handler to continue as a * normal page fault.
*/
regs->pc = (unsignedlong)cur->addr; if (kcb->kprobe_status == KPROBE_REENTER)
restore_previous_kprobe(kcb); else
reset_current_kprobe();
preempt_enable_no_resched(); break; case KPROBE_HIT_ACTIVE: case KPROBE_HIT_SSDONE: /* * In case the user-specified fault handler returned * zero, try to fix up.
*/ if ((entry = search_exception_tables(regs->pc)) != NULL) {
regs->pc = entry->fixup; return 1;
}
/* * fixup_exception() could not handle it, * Let do_page_fault() fix it.
*/ break; default: break;
}
return 0;
}
/* * Wrapper routine to for handling exceptions.
*/ int __kprobes kprobe_exceptions_notify(struct notifier_block *self, unsignedlong val, void *data)
{ struct die_args *args = (struct die_args *)data; int ret = NOTIFY_DONE; struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
if (val == DIE_TRAP &&
args->trapnr == (BREAKPOINT_INSTRUCTION & 0xff)) { if (!kprobe_running()) { if (kprobe_handler(args->regs)) {
ret = NOTIFY_STOP;
} else { /* Not a kprobe trap */
ret = NOTIFY_DONE;
}
} else { if ((kcb->kprobe_status == KPROBE_HIT_SS) ||
(kcb->kprobe_status == KPROBE_REENTER)) { if (post_kprobe_handler(args->regs))
ret = NOTIFY_STOP;
} else { if (kprobe_handler(args->regs))
ret = NOTIFY_STOP;
}
}
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.