2 * Dynamic Binary Instrumentation Module based on KProbes
3 * modules/kprobe/arch/asm-arm/dbi_kprobes.c
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 * Copyright (C) Samsung Electronics, 2006-2010
21 * 2006-2007 Ekaterina Gorelkina <e.gorelkina@samsung.com>: initial implementation for ARM/MIPS
22 * 2008-2009 Alexey Gerenkov <a.gerenkov@samsung.com> User-Space
23 * Probes initial implementation; Support x86.
24 * 2010 Ekaterina Gorelkina <e.gorelkina@samsung.com>: redesign module for separating core and arch parts
25 * 2010-2011 Alexander Shirshikov <a.shirshikov@samsung.com>: initial implementation for Thumb
26 * 2012 Stanislav Andreev <s.andreev@samsung.com>: added time debug profiling support; BUG() message fix
27 * 2012 Stanislav Andreev <s.andreev@samsung.com>: redesign of kprobe functionality -
28 * kprobe_handler() now called via undefined instruction hooks
29 * 2012 Stanislav Andreev <s.andreev@samsung.com>: hash tables search implemented for uprobes
32 #include <linux/module.h>
35 #include "dbi_kprobes.h"
36 #include "../dbi_kprobes.h"
37 #include "../../dbi_kprobes.h"
39 #include "../../dbi_kdebug.h"
40 #include "../../dbi_insn_slots.h"
41 #include "../../dbi_kprobes_deps.h"
44 #include <asm/cacheflush.h>
46 #ifdef TRAP_OVERHEAD_DEBUG
47 #include <linux/pid.h>
48 #include <linux/signal.h>
52 #include <linux/time.h>
55 #include <asm/traps.h>
56 #include <asm/ptrace.h>
57 #include <linux/list.h>
58 #include <linux/hash.h>
60 #define SUPRESS_BUG_MESSAGES
62 extern struct kprobe * per_cpu__current_kprobe;
63 extern struct hlist_head kprobe_table[KPROBE_TABLE_SIZE];
66 unsigned long swap_sum_time = 0;
67 unsigned long swap_sum_hit = 0;
68 EXPORT_SYMBOL_GPL (swap_sum_time);
69 EXPORT_SYMBOL_GPL (swap_sum_hit);
72 #define sign_extend(x, signbit) ((x) | (0 - ((x) & (1 << (signbit)))))
73 #define branch_displacement(insn) sign_extend(((insn) & 0xffffff) << 2, 25)
75 static kprobe_opcode_t get_addr_b(kprobe_opcode_t insn, kprobe_opcode_t *addr)
77 // real position less then PC by 8
78 return (kprobe_opcode_t)((long)addr + 8 + branch_displacement(insn));
81 static unsigned int arr_traps_template[] = {
82 0xe1a0c00d, // mov ip, sp
83 0xe92dd800, // stmdb sp!, {fp, ip, lr, pc}
84 0xe24cb004, // sub fp, ip, #4 ; 0x4
86 0xe3500000, // cmp r0, #0 ; 0x0
87 0xe89da800, // ldmia sp, {fp, sp, pc}
93 static struct kprobe trampoline_p =
95 .addr = (kprobe_opcode_t *) & kretprobe_trampoline,
96 .pre_handler = trampoline_probe_handler
99 // is instruction Thumb2 and NOT a branch, etc...
100 static int isThumb2(kprobe_opcode_t insn)
102 if(( (insn & 0xf800) == 0xe800 ||
103 (insn & 0xf800) == 0xf000 ||
104 (insn & 0xf800) == 0xf800)) return 1;
109 static int prep_pc_dep_insn_execbuf (kprobe_opcode_t * insns, kprobe_opcode_t insn, int uregs)
117 for (i = 0; i < 13; i++, reg_mask <<= 1)
119 if (!(insn & reg_mask))
125 for (i = 0; i < 13; i++)
127 if ((uregs & 0x1) && (ARM_INSN_REG_RN (insn) == i))
129 if ((uregs & 0x2) && (ARM_INSN_REG_RD (insn) == i))
131 if ((uregs & 0x4) && (ARM_INSN_REG_RS (insn) == i))
133 if ((uregs & 0x8) && (ARM_INSN_REG_RM (insn) == i))
140 DBPRINTF ("there are no free register %x in insn %lx!", uregs, insn);
143 DBPRINTF ("prep_pc_dep_insn_execbuf: using R%d, changing regs %x", i, uregs);
145 // set register to save
146 ARM_INSN_REG_SET_RD (insns[0], i);
147 // set register to load address to
148 ARM_INSN_REG_SET_RD (insns[1], i);
149 // set instruction to execute and patch it
152 ARM_INSN_REG_CLEAR_MR (insn, 15);
153 ARM_INSN_REG_SET_MR (insn, i);
157 if ((uregs & 0x1) && (ARM_INSN_REG_RN (insn) == 15))
158 ARM_INSN_REG_SET_RN (insn, i);
159 if ((uregs & 0x2) && (ARM_INSN_REG_RD (insn) == 15))
160 ARM_INSN_REG_SET_RD (insn, i);
161 if ((uregs & 0x4) && (ARM_INSN_REG_RS (insn) == 15))
162 ARM_INSN_REG_SET_RS (insn, i);
163 if ((uregs & 0x8) && (ARM_INSN_REG_RM (insn) == 15))
164 ARM_INSN_REG_SET_RM (insn, i);
166 insns[UPROBES_TRAMP_INSN_IDX] = insn;
167 // set register to restore
168 ARM_INSN_REG_SET_RD (insns[3], i);
174 static int prep_pc_dep_insn_execbuf_thumb (kprobe_opcode_t * insns, kprobe_opcode_t insn, int uregs)
176 unsigned char mreg = 0;
177 unsigned char reg = 0;
180 if (THUMB_INSN_MATCH (APC, insn) || THUMB_INSN_MATCH (LRO3, insn))
182 reg = ((insn & 0xffff) & uregs) >> 8;
184 if (THUMB_INSN_MATCH (MOV3, insn))
186 if (((((unsigned char) insn) & 0xff) >> 3) == 15)
187 reg = (insn & 0xffff) & uregs;
191 if (THUMB2_INSN_MATCH (ADR, insn))
193 reg = ((insn >> 16) & uregs) >> 8;
194 if (reg == 15) return 0;
196 if (THUMB2_INSN_MATCH (LDRW, insn) || THUMB2_INSN_MATCH (LDRW1, insn) ||
197 THUMB2_INSN_MATCH (LDRHW, insn) || THUMB2_INSN_MATCH (LDRHW1, insn) ||
198 THUMB2_INSN_MATCH (LDRWL, insn))
200 reg = ((insn >> 16) & uregs) >> 12;
201 if (reg == 15) return 0;
203 // LDRB.W PC, [PC, #immed] => PLD [PC, #immed], so Rt == PC is skipped
204 if (THUMB2_INSN_MATCH (LDRBW, insn) || THUMB2_INSN_MATCH (LDRBW1, insn) || THUMB2_INSN_MATCH (LDREX, insn))
206 reg = ((insn >> 16) & uregs) >> 12;
208 if (THUMB2_INSN_MATCH (DP, insn))
210 reg = ((insn >> 16) & uregs) >> 12;
211 if (reg == 15) return 0;
213 if (THUMB2_INSN_MATCH (RSBW, insn))
215 reg = ((insn >> 12) & uregs) >> 8;
216 if (reg == 15) return 0;
218 if (THUMB2_INSN_MATCH (RORW, insn))
220 reg = ((insn >> 12) & uregs) >> 8;
221 if (reg == 15) return 0;
223 if (THUMB2_INSN_MATCH (ROR, insn) || THUMB2_INSN_MATCH (LSLW1, insn) || THUMB2_INSN_MATCH (LSLW2, insn) || THUMB2_INSN_MATCH (LSRW1, insn) || THUMB2_INSN_MATCH (LSRW2, insn))
225 reg = ((insn >> 12) & uregs) >> 8;
226 if (reg == 15) return 0;
228 if (THUMB2_INSN_MATCH (TEQ1, insn) || THUMB2_INSN_MATCH (TST1, insn))
232 if (THUMB2_INSN_MATCH (TEQ2, insn) || THUMB2_INSN_MATCH (TST2, insn))
234 reg = THUMB2_INSN_REG_RM(insn);
247 if (( THUMB2_INSN_MATCH (STRW, insn) || THUMB2_INSN_MATCH (STRBW, insn) || THUMB2_INSN_MATCH (STRD, insn) || \
248 THUMB2_INSN_MATCH (STRHT, insn) || THUMB2_INSN_MATCH (STRT, insn) || THUMB2_INSN_MATCH (STRHW1, insn) || \
249 THUMB2_INSN_MATCH (STRHW, insn)) && THUMB2_INSN_REG_RT(insn) == 15)
251 reg = THUMB2_INSN_REG_RT(insn);
254 if (reg == 6 || reg == 7)
256 *((unsigned short*)insns + 0) = (*((unsigned short*)insns + 0) & 0x00ff) | ((1 << mreg) | (1 << (mreg + 1)));
257 *((unsigned short*)insns + 1) = (*((unsigned short*)insns + 1) & 0xf8ff) | (mreg << 8);
258 *((unsigned short*)insns + 2) = (*((unsigned short*)insns + 2) & 0xfff8) | (mreg + 1);
259 *((unsigned short*)insns + 3) = (*((unsigned short*)insns + 3) & 0xffc7) | (mreg << 3);
260 *((unsigned short*)insns + 7) = (*((unsigned short*)insns + 7) & 0xf8ff) | (mreg << 8);
261 *((unsigned short*)insns + 8) = (*((unsigned short*)insns + 8) & 0xffc7) | (mreg << 3);
262 *((unsigned short*)insns + 9) = (*((unsigned short*)insns + 9) & 0xffc7) | ((mreg + 1) << 3);
263 *((unsigned short*)insns + 10) = (*((unsigned short*)insns + 10) & 0x00ff) | (( 1 << mreg) | (1 << (mreg + 1)));
267 if (THUMB_INSN_MATCH (APC, insn))
269 // ADD Rd, PC, #immed_8*4 -> ADD Rd, SP, #immed_8*4
270 *((unsigned short*)insns + 4) = ((insn & 0xffff) | 0x800); // ADD Rd, SP, #immed_8*4
272 if (THUMB_INSN_MATCH (LRO3, insn))
274 // LDR Rd, [PC, #immed_8*4] -> LDR Rd, [SP, #immed_8*4]
275 *((unsigned short*)insns + 4) = ((insn & 0xffff) + 0x5000); // LDR Rd, [SP, #immed_8*4]
277 if (THUMB_INSN_MATCH (MOV3, insn))
279 // MOV Rd, PC -> MOV Rd, SP
280 *((unsigned short*)insns + 4) = ((insn & 0xffff) ^ 0x10); // MOV Rd, SP
282 if (THUMB2_INSN_MATCH (ADR, insn))
284 // ADDW Rd, PC, #imm -> ADDW Rd, SP, #imm
285 insns[2] = (insn & 0xfffffff0) | 0x0d; // ADDW Rd, SP, #imm
287 if (THUMB2_INSN_MATCH (LDRW, insn) || THUMB2_INSN_MATCH (LDRBW, insn) ||
288 THUMB2_INSN_MATCH (LDRHW, insn))
290 // LDR.W Rt, [PC, #-<imm_12>] -> LDR.W Rt, [SP, #-<imm_8>]
291 // !!!!!!!!!!!!!!!!!!!!!!!!
292 // !!! imm_12 vs. imm_8 !!!
293 // !!!!!!!!!!!!!!!!!!!!!!!!
294 insns[2] = (insn & 0xf0fffff0) | 0x0c00000d; // LDR.W Rt, [SP, #-<imm_8>]
296 if (THUMB2_INSN_MATCH (LDRW1, insn) || THUMB2_INSN_MATCH (LDRBW1, insn) ||
297 THUMB2_INSN_MATCH (LDRHW1, insn) || THUMB2_INSN_MATCH (LDRD, insn) || THUMB2_INSN_MATCH (LDRD1, insn) ||
298 THUMB2_INSN_MATCH (LDREX, insn))
300 // LDRx.W Rt, [PC, #+<imm_12>] -> LDRx.W Rt, [SP, #+<imm_12>] (+/-imm_8 for LDRD Rt, Rt2, [PC, #<imm_8>]
301 insns[2] = (insn & 0xfffffff0) | 0xd; // LDRx.W Rt, [SP, #+<imm_12>]
303 if (THUMB2_INSN_MATCH (MUL, insn))
305 insns[2] = (insn & 0xfff0ffff) | 0x000d0000; // MUL Rd, Rn, SP
306 }else{ if (THUMB2_INSN_MATCH (DP, insn))
308 if (THUMB2_INSN_REG_RM(insn) == 15) insns[2] = (insn & 0xfff0ffff) | 0x000d0000; // DP Rd, Rn, PC
309 else if (THUMB2_INSN_REG_RN(insn) == 15) insns[2] = (insn & 0xfffffff0) | 0xd; // DP Rd, PC, Rm
310 }else{ if (THUMB2_INSN_MATCH (LDRWL, insn))
312 // LDRx.W Rt, [PC, #<imm_12>] -> LDRx.W Rt, [SP, #+<imm_12>] (+/-imm_8 for LDRD Rt, Rt2, [PC, #<imm_8>]
313 insns[2] = (insn & 0xfffffff0) | 0xd; // LDRx.W Rt, [SP, #+<imm_12>]
314 }else{ if (THUMB2_INSN_MATCH (RSBW, insn))
316 insns[2] = (insn & 0xfffffff0) | 0xd; // RSB{S}.W Rd, PC, #<const> -> RSB{S}.W Rd, SP, #<const>
317 }else{ if (THUMB2_INSN_MATCH (RORW, insn) || THUMB2_INSN_MATCH (LSLW1, insn) || THUMB2_INSN_MATCH (LSRW1, insn))
319 if ((THUMB2_INSN_REG_RM(insn) == 15) && (THUMB2_INSN_REG_RN(insn) == 15))
321 insns[2] = (insn & 0xfffdfffd); // ROR.W Rd, PC, PC
322 }else if (THUMB2_INSN_REG_RM(insn) == 15) insns[2] = (insn & 0xfff0ffff) | 0xd0000; // ROR.W Rd, Rn, PC
323 else if (THUMB2_INSN_REG_RN(insn) == 15) insns[2] = (insn & 0xfffffff0) | 0xd; // ROR.W Rd, PC, Rm
324 }else{ if (THUMB2_INSN_MATCH (ROR, insn) || THUMB2_INSN_MATCH (LSLW2, insn) || THUMB2_INSN_MATCH (LSRW2, insn))
326 insns[2] = (insn & 0xfff0ffff) | 0xd0000; // ROR{S} Rd, PC, #<const> -> ROR{S} Rd, SP, #<const>
340 if (THUMB2_INSN_MATCH (STRW, insn) || THUMB2_INSN_MATCH (STRBW, insn))
342 insns[2] = (insn & 0xfff0ffff) | 0x000d0000; // STRx.W Rt, [Rn, SP]
344 if (THUMB2_INSN_MATCH (STRD, insn) || THUMB2_INSN_MATCH (STRHT, insn) || THUMB2_INSN_MATCH (STRT, insn) || THUMB2_INSN_MATCH (STRHW1, insn))
346 if (THUMB2_INSN_REG_RN(insn) == 15)
348 insns[2] = (insn & 0xfffffff0) | 0xd; // STRD/T/HT{.W} Rt, [SP, ...]
353 if (THUMB2_INSN_MATCH (STRHW, insn) && (THUMB2_INSN_REG_RN(insn) == 15))
355 if (THUMB2_INSN_REG_RN(insn) == 15)
357 insns[2] = (insn & 0xf0fffff0) | 0x0c00000d; // STRH.W Rt, [SP, #-<imm_8>]
366 if ((reg == 15) && (THUMB2_INSN_MATCH (STRW, insn) || \
367 THUMB2_INSN_MATCH (STRBW, insn) || \
368 THUMB2_INSN_MATCH (STRD, insn) || \
369 THUMB2_INSN_MATCH (STRHT, insn) || \
370 THUMB2_INSN_MATCH (STRT, insn) || \
371 THUMB2_INSN_MATCH (STRHW1, insn) || \
372 THUMB2_INSN_MATCH (STRHW, insn) ))
374 insns[2] = (insns[2] & 0x0fffffff) | 0xd0000000;
379 if (THUMB2_INSN_MATCH (TEQ1, insn) || THUMB2_INSN_MATCH (TST1, insn))
381 insns[2] = (insn & 0xfffffff0) | 0xd; // TEQ SP, #<const>
382 }else{ if (THUMB2_INSN_MATCH (TEQ2, insn) || THUMB2_INSN_MATCH (TST2, insn))
384 if ((THUMB2_INSN_REG_RN(insn) == 15) && (THUMB2_INSN_REG_RM(insn) == 15))
386 insns[2] = (insn & 0xfffdfffd); // TEQ/TST PC, PC
387 }else if (THUMB2_INSN_REG_RM(insn) == 15) insns[2] = (insn & 0xfff0ffff) | 0xd0000; // TEQ/TST Rn, PC
388 else if (THUMB2_INSN_REG_RN(insn) == 15) insns[2] = (insn & 0xfffffff0) | 0xd; // TEQ/TST PC, Rm
397 static int arch_check_insn_arm (struct arch_specific_insn *ainsn)
401 // check instructions that can change PC by nature
403 // ARM_INSN_MATCH (UNDEF, ainsn->insn_arm[0]) ||
404 ARM_INSN_MATCH (AUNDEF, ainsn->insn_arm[0]) ||
405 ARM_INSN_MATCH (SWI, ainsn->insn_arm[0]) ||
406 ARM_INSN_MATCH (BREAK, ainsn->insn_arm[0]) ||
407 ARM_INSN_MATCH (BL, ainsn->insn_arm[0]) ||
408 ARM_INSN_MATCH (BLX1, ainsn->insn_arm[0]) ||
409 ARM_INSN_MATCH (BLX2, ainsn->insn_arm[0]) ||
410 ARM_INSN_MATCH (BX, ainsn->insn_arm[0]) ||
411 ARM_INSN_MATCH (BXJ, ainsn->insn_arm[0]))
413 DBPRINTF ("Bad insn arch_check_insn_arm: %lx\n", ainsn->insn_arm[0]);
416 #ifndef CONFIG_CPU_V7
417 // check instructions that can write result to PC
418 else if ((ARM_INSN_MATCH (DPIS, ainsn->insn_arm[0]) ||
419 ARM_INSN_MATCH (DPRS, ainsn->insn_arm[0]) ||
420 ARM_INSN_MATCH (DPI, ainsn->insn_arm[0]) ||
421 ARM_INSN_MATCH (LIO, ainsn->insn_arm[0]) ||
422 ARM_INSN_MATCH (LRO, ainsn->insn_arm[0])) &&
423 (ARM_INSN_REG_RD (ainsn->insn_arm[0]) == 15))
425 DBPRINTF ("Bad arch_check_insn_arm: %lx\n", ainsn->insn_arm[0]);
428 #endif // CONFIG_CPU_V7
429 // check special instruction loads store multiple registers
430 else if ((ARM_INSN_MATCH (LM, ainsn->insn_arm[0]) || ARM_INSN_MATCH (SM, ainsn->insn_arm[0])) &&
431 // store pc or load to pc
432 (ARM_INSN_REG_MR (ainsn->insn_arm[0], 15) ||
433 // store/load with pc update
434 ((ARM_INSN_REG_RN (ainsn->insn_arm[0]) == 15) && (ainsn->insn_arm[0] & 0x200000))))
436 DBPRINTF ("Bad insn arch_check_insn_arm: %lx\n", ainsn->insn_arm[0]);
442 static int arch_check_insn_thumb (struct arch_specific_insn *ainsn)
446 // check instructions that can change PC
447 if ( THUMB_INSN_MATCH (UNDEF, ainsn->insn_thumb[0]) ||
448 THUMB_INSN_MATCH (SWI, ainsn->insn_thumb[0]) ||
449 THUMB_INSN_MATCH (BREAK, ainsn->insn_thumb[0]) ||
450 THUMB2_INSN_MATCH (BL, ainsn->insn_thumb[0]) ||
451 THUMB_INSN_MATCH (B1, ainsn->insn_thumb[0]) ||
452 THUMB_INSN_MATCH (B2, ainsn->insn_thumb[0]) ||
453 THUMB_INSN_MATCH (CBZ, ainsn->insn_thumb[0]) ||
454 THUMB2_INSN_MATCH (B1, ainsn->insn_thumb[0]) ||
455 THUMB2_INSN_MATCH (B2, ainsn->insn_thumb[0]) ||
456 THUMB2_INSN_MATCH (BLX1, ainsn->insn_thumb[0]) ||
457 THUMB_INSN_MATCH (BLX2, ainsn->insn_thumb[0]) ||
458 THUMB_INSN_MATCH (BX, ainsn->insn_thumb[0]) ||
459 THUMB2_INSN_MATCH (BXJ, ainsn->insn_thumb[0]) ||
460 (THUMB2_INSN_MATCH (ADR, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
461 (THUMB2_INSN_MATCH (LDRW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RT(ainsn->insn_thumb[0]) == 15) ||
462 (THUMB2_INSN_MATCH (LDRW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RT(ainsn->insn_thumb[0]) == 15) ||
463 (THUMB2_INSN_MATCH (LDRHW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RT(ainsn->insn_thumb[0]) == 15) ||
464 (THUMB2_INSN_MATCH (LDRHW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RT(ainsn->insn_thumb[0]) == 15) ||
465 (THUMB2_INSN_MATCH (LDRWL, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RT(ainsn->insn_thumb[0]) == 15) ||
466 THUMB2_INSN_MATCH (LDMIA, ainsn->insn_thumb[0]) ||
467 THUMB2_INSN_MATCH (LDMDB, ainsn->insn_thumb[0]) ||
468 (THUMB2_INSN_MATCH (DP, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
469 (THUMB2_INSN_MATCH (RSBW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
470 (THUMB2_INSN_MATCH (RORW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
471 (THUMB2_INSN_MATCH (ROR, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
472 (THUMB2_INSN_MATCH (LSLW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
473 (THUMB2_INSN_MATCH (LSLW2, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
474 (THUMB2_INSN_MATCH (LSRW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
475 (THUMB2_INSN_MATCH (LSRW2, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RD(ainsn->insn_thumb[0]) == 15) ||
476 /* skip PC, #-imm12 -> SP, #-imm8 and Tegra-hanging instructions */
477 (THUMB2_INSN_MATCH (STRW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
478 (THUMB2_INSN_MATCH (STRBW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
479 (THUMB2_INSN_MATCH (STRHW1, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
480 (THUMB2_INSN_MATCH (STRW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
481 (THUMB2_INSN_MATCH (STRHW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
482 (THUMB2_INSN_MATCH (LDRW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
483 (THUMB2_INSN_MATCH (LDRBW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
484 (THUMB2_INSN_MATCH (LDRHW, ainsn->insn_thumb[0]) && THUMB2_INSN_REG_RN(ainsn->insn_thumb[0]) == 15) ||
485 /* skip STRDx/LDRDx Rt, Rt2, [Rd, ...] */
486 (THUMB2_INSN_MATCH (LDRD, ainsn->insn_thumb[0]) || THUMB2_INSN_MATCH (LDRD1, ainsn->insn_thumb[0]) || THUMB2_INSN_MATCH (STRD, ainsn->insn_thumb[0])) )
488 DBPRINTF ("Bad insn arch_check_insn_thumb: %lx\n", ainsn->insn_thumb[0]);
495 int arch_prepare_kretprobe (struct kretprobe *p)
497 DBPRINTF("Warrning: arch_prepare_kretprobe is not implemented\n");
501 int arch_prepare_kprobe (struct kprobe *p)
503 kprobe_opcode_t insns[KPROBES_TRAMP_LEN];
504 int uregs, pc_dep, ret = 0;
505 kprobe_opcode_t insn[MAX_INSN_SIZE];
506 struct arch_specific_insn ainsn;
508 /* insn: must be on special executable page on i386. */
509 p->ainsn.insn = get_insn_slot (NULL, 0);
513 memcpy (insn, p->addr, MAX_INSN_SIZE * sizeof (kprobe_opcode_t));
514 ainsn.insn_arm = ainsn.insn = insn;
515 ret = arch_check_insn_arm (&ainsn);
518 p->opcode = *p->addr;
522 if(ARM_INSN_MATCH (DPIS, insn[0]) || ARM_INSN_MATCH (LRO, insn[0]) ||
523 ARM_INSN_MATCH (SRO, insn[0]))
526 if( (ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_REG_RM (insn[0]) == 15) ||
527 (ARM_INSN_MATCH (SRO, insn[0]) && (ARM_INSN_REG_RD (insn[0]) == 15)) )
529 DBPRINTF ("Unboostable insn %lx, DPIS/LRO/SRO\n", insn[0]);
534 else if(ARM_INSN_MATCH (DPI, insn[0]) || ARM_INSN_MATCH (LIO, insn[0]) ||
535 ARM_INSN_MATCH (SIO, insn[0]))
538 if ((ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_MATCH (SIO, insn[0]) &&
539 (ARM_INSN_REG_RD (insn[0]) == 15)))
542 DBPRINTF ("Unboostable insn %lx/%p, DPI/LIO/SIO\n", insn[0], p);
546 else if(ARM_INSN_MATCH (DPRS, insn[0]))
549 if ((ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_REG_RM (insn[0]) == 15) ||
550 (ARM_INSN_REG_RS (insn[0]) == 15))
553 DBPRINTF ("Unboostable insn %lx, DPRS\n", insn[0]);
557 else if(ARM_INSN_MATCH (SM, insn[0]))
560 if (ARM_INSN_REG_MR (insn[0], 15))
562 DBPRINTF ("Unboostable insn %lx, SM\n", insn[0]);
566 // check instructions that can write result to SP andu uses PC
567 if (pc_dep && (ARM_INSN_REG_RD (ainsn.insn[0]) == 13))
569 free_insn_slot(&kprobe_insn_pages, NULL, p->ainsn.insn);
576 memcpy (insns, pc_dep_insn_execbuf, sizeof (insns));
577 if (prep_pc_dep_insn_execbuf (insns, insn[0], uregs) != 0)
579 DBPRINTF ("failed to prepare exec buffer for insn %lx!", insn[0]);
580 free_insn_slot(&kprobe_insn_pages, NULL, p->ainsn.insn);
583 insns[6] = (kprobe_opcode_t) (p->addr + 2);
587 memcpy (insns, gen_insn_execbuf, sizeof (insns));
588 insns[KPROBES_TRAMP_INSN_IDX] = insn[0];
590 insns[7] = (kprobe_opcode_t) (p->addr + 1);
591 DBPRINTF ("arch_prepare_kprobe: insn %lx", insn[0]);
592 DBPRINTF ("arch_prepare_kprobe: to %p - %lx %lx %lx %lx %lx %lx %lx %lx %lx",
593 p->ainsn.insn, insns[0], insns[1], insns[2], insns[3], insns[4],
594 insns[5], insns[6], insns[7], insns[8]);
595 memcpy (p->ainsn.insn, insns, sizeof(insns));
596 flush_icache_range((long unsigned)p->ainsn.insn, (long unsigned)(p->ainsn.insn) + sizeof(insns));
604 free_insn_slot(&kprobe_insn_pages, NULL, p->ainsn.insn);
605 printk("arch_prepare_kprobe: instruction 0x%lx not instrumentation, addr=0x%p\n", insn[0], p->addr);
611 static unsigned int arch_construct_brunch (unsigned int base, unsigned int addr, int link)
613 kprobe_opcode_t insn;
614 unsigned int bpi = (unsigned int) base - (unsigned int) addr - 8;
617 DBPRINTF ("base=%x addr=%x base-addr-8=%x\n", base, addr, bpi);
618 if (abs (insn & 0xffffff) > 0xffffff)
620 DBPRINTF ("ERROR: kprobe address out of range\n");
623 insn = insn & 0xffffff;
624 insn = insn | ((link != 0) ? 0xeb000000 : 0xea000000);
625 DBPRINTF ("insn=%lX\n", insn);
626 return (unsigned int) insn;
630 int arch_copy_trampoline_arm_uprobe (struct kprobe *p, struct task_struct *task, int atomic);
631 int arch_copy_trampoline_thumb_uprobe (struct kprobe *p, struct task_struct *task, int atomic);
633 int arch_prepare_uprobe (struct kprobe *p, struct task_struct *task, int atomic)
636 kprobe_opcode_t insn[MAX_INSN_SIZE];
638 if ((unsigned long) p->addr & 0x01)
640 printk("Error in %s at %d: attempt to register kprobe at an unaligned address\n", __FILE__, __LINE__);
643 if (!read_proc_vm_atomic (task, (unsigned long) p->addr, &insn, MAX_INSN_SIZE * sizeof(kprobe_opcode_t)))
644 panic ("Failed to read memory task[tgid=%u, comm=%s] %p!\n", task->tgid, task->comm, p->addr);
646 p->ainsn.insn_arm = get_insn_slot(task, atomic);
647 if (!p->ainsn.insn_arm) {
648 printk("Error in %s at %d: kprobe slot allocation error (arm)\n", __FILE__, __LINE__);
651 ret = arch_copy_trampoline_arm_uprobe(p, task, 1);
653 free_insn_slot(&uprobe_insn_pages, task, p->ainsn.insn_arm);
656 p->ainsn.insn_thumb = get_insn_slot(task, atomic);
657 if (!p->ainsn.insn_thumb) {
658 printk("Error in %s at %d: kprobe slot allocation error (thumb)\n", __FILE__, __LINE__);
661 ret = arch_copy_trampoline_thumb_uprobe(p, task, 1);
663 free_insn_slot(&uprobe_insn_pages, task, p->ainsn.insn_arm);
664 free_insn_slot(&uprobe_insn_pages, task, p->ainsn.insn_thumb);
667 if ((p->safe_arm == -1) && (p->safe_thumb == -1)) {
668 printk("Error in %s at %d: failed arch_copy_trampoline_*_uprobe() (both) [tgid=%u, addr=%lx, data=%lx]\n",
669 __FILE__, __LINE__, task->tgid, (unsigned long)p->addr, (unsigned long)p->opcode);
670 if (!write_proc_vm_atomic (task, (unsigned long) p->addr, &p->opcode, sizeof (p->opcode)))
671 panic ("Failed to write memory %p!\n", p->addr);
672 free_insn_slot(&uprobe_insn_pages, task, p->ainsn.insn_arm);
673 free_insn_slot(&uprobe_insn_pages, task, p->ainsn.insn_thumb);
678 EXPORT_SYMBOL_GPL(arch_prepare_uprobe);
680 int arch_prepare_uretprobe (struct kretprobe *p, struct task_struct *task)
682 DBPRINTF("Warrning: arch_prepare_uretprobe is not implemented\n");
685 EXPORT_SYMBOL_GPL(arch_prepare_uretprobe);
687 void prepare_singlestep (struct kprobe *p, struct pt_regs *regs)
690 regs->ARM_pc = (unsigned long)p->ss_addr;
693 regs->ARM_pc = (unsigned long)p->ainsn.insn;
697 void save_previous_kprobe(struct kprobe_ctlblk *kcb, struct kprobe *p_run)
700 panic("arm_save_previous_kprobe: p_run == NULL\n");
703 if (kcb->prev_kprobe.kp != NULL) {
704 DBPRINTF ("no space to save new probe[]: task = %d/%s", current->pid, current->comm);
707 kcb->prev_kprobe.kp = p_run;
708 kcb->prev_kprobe.status = kcb->kprobe_status;
711 void restore_previous_kprobe(struct kprobe_ctlblk *kcb)
713 set_current_kprobe(kcb->prev_kprobe.kp, NULL, NULL);
714 kcb->kprobe_status = kcb->prev_kprobe.status;
715 kcb->prev_kprobe.kp = NULL;
716 kcb->prev_kprobe.status = 0;
719 void set_current_kprobe(struct kprobe *p, struct pt_regs *regs, struct kprobe_ctlblk *kcb)
721 __get_cpu_var(current_kprobe) = p;
722 DBPRINTF ("set_current_kprobe: p=%p addr=%p\n", p, p->addr);
725 int arch_copy_trampoline_arm_uprobe (struct kprobe *p, struct task_struct *task, int atomic)
727 kprobe_opcode_t insns[UPROBES_TRAMP_LEN];
729 kprobe_opcode_t insn[MAX_INSN_SIZE];
730 struct arch_specific_insn ainsn;
733 if ((unsigned long) p->addr & 0x01)
735 printk("Error in %s at %d: attempt to register kprobe at an unaligned address\n", __FILE__, __LINE__);
739 ainsn.insn_arm = insn;
740 if (!arch_check_insn_arm(&ainsn))
746 if (ARM_INSN_MATCH (DPIS, insn[0]) || ARM_INSN_MATCH (LRO, insn[0]) ||
747 ARM_INSN_MATCH (SRO, insn[0]))
750 if ((ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_REG_RM (insn[0]) == 15) ||
751 (ARM_INSN_MATCH (SRO, insn[0]) && (ARM_INSN_REG_RD (insn[0]) == 15)))
753 DBPRINTF ("Unboostable insn %lx, DPIS/LRO/SRO\n", insn[0]);
758 else if (ARM_INSN_MATCH (DPI, insn[0]) || ARM_INSN_MATCH (LIO, insn[0]) ||
759 ARM_INSN_MATCH (SIO, insn[0]))
762 if ((ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_MATCH (SIO, insn[0]) &&
763 (ARM_INSN_REG_RD (insn[0]) == 15)))
766 DBPRINTF ("Unboostable insn %lx/%p, DPI/LIO/SIO\n", insn[0], p);
770 else if (ARM_INSN_MATCH (DPRS, insn[0]))
773 if ((ARM_INSN_REG_RN (insn[0]) == 15) || (ARM_INSN_REG_RM (insn[0]) == 15) ||
774 (ARM_INSN_REG_RS (insn[0]) == 15))
777 DBPRINTF ("Unboostable insn %lx, DPRS\n", insn[0]);
781 else if (ARM_INSN_MATCH (SM, insn[0]))
784 if (ARM_INSN_REG_MR (insn[0], 15))
786 DBPRINTF ("Unboostable insn %lx, SM\n", insn[0]);
790 // check instructions that can write result to SP andu uses PC
791 if (pc_dep && (ARM_INSN_REG_RD (ainsn.insn_arm[0]) == 13))
793 printk("Error in %s at %d: instruction check failed (arm)\n", __FILE__, __LINE__);
795 // TODO: move free to later phase
796 //free_insn_slot (&uprobe_insn_pages, task, p->ainsn.insn_arm, 0);
799 if (unlikely(uregs && pc_dep))
801 memcpy (insns, pc_dep_insn_execbuf, sizeof (insns));
802 if (prep_pc_dep_insn_execbuf (insns, insn[0], uregs) != 0)
804 printk("Error in %s at %d: failed to prepare exec buffer for insn %lx!",
805 __FILE__, __LINE__, insn[0]);
807 // TODO: move free to later phase
808 //free_insn_slot (&uprobe_insn_pages, task, p->ainsn.insn_arm, 0);
811 //insns[UPROBES_TRAMP_SS_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
812 insns[6] = (kprobe_opcode_t) (p->addr + 2);
816 memcpy (insns, gen_insn_execbuf, sizeof (insns));
817 insns[UPROBES_TRAMP_INSN_IDX] = insn[0];
819 insns[UPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
820 insns[7] = (kprobe_opcode_t) (p->addr + 1);
823 if(ARM_INSN_MATCH (B, ainsn.insn_arm[0]))
825 memcpy (insns, pc_dep_insn_execbuf, sizeof (insns));
826 insns[UPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
827 insns[6] = (kprobe_opcode_t) (p->addr + 2);
828 insns[7] = get_addr_b(p->opcode, p->addr);
831 DBPRINTF ("arch_prepare_uprobe: to %p - %lx %lx %lx %lx %lx %lx %lx %lx %lx",
832 p->ainsn.insn_arm, insns[0], insns[1], insns[2], insns[3], insns[4],
833 insns[5], insns[6], insns[7], insns[8]);
834 if (!write_proc_vm_atomic (task, (unsigned long) p->ainsn.insn_arm, insns, sizeof (insns)))
836 panic("failed to write memory %p!\n", p->ainsn.insn);
837 // Mr_Nobody: we have to panic, really??...
838 //free_insn_slot (&uprobe_insn_pages, task, p->ainsn.insn_arm, 0);
844 int arch_copy_trampoline_thumb_uprobe (struct kprobe *p, struct task_struct *task, int atomic)
848 kprobe_opcode_t insn[MAX_INSN_SIZE];
849 struct arch_specific_insn ainsn;
850 kprobe_opcode_t insns[UPROBES_TRAMP_LEN * 2];
853 if ((unsigned long) p->addr & 0x01)
855 printk("Error in %s at %d: attempt to register kprobe at an unaligned address\n", __FILE__, __LINE__);
859 ainsn.insn_thumb = insn;
860 if (!arch_check_insn_thumb(&ainsn))
866 if (THUMB_INSN_MATCH (APC, insn[0]) || THUMB_INSN_MATCH (LRO3, insn[0]))
868 uregs = 0x0700; // 8-10
871 else if (THUMB_INSN_MATCH (MOV3, insn[0]) && (((((unsigned char) insn[0]) & 0xff) >> 3) == 15))
877 else if THUMB2_INSN_MATCH (ADR, insn[0])
879 uregs = 0x0f00; // Rd 8-11
882 else if (((THUMB2_INSN_MATCH (LDRW, insn[0]) || THUMB2_INSN_MATCH (LDRW1, insn[0]) ||
883 THUMB2_INSN_MATCH (LDRBW, insn[0]) || THUMB2_INSN_MATCH (LDRBW1, insn[0]) ||
884 THUMB2_INSN_MATCH (LDRHW, insn[0]) || THUMB2_INSN_MATCH (LDRHW1, insn[0]) ||
885 THUMB2_INSN_MATCH (LDRWL, insn[0])) && THUMB2_INSN_REG_RN(insn[0]) == 15) ||
886 THUMB2_INSN_MATCH (LDREX, insn[0]) ||
887 ((THUMB2_INSN_MATCH (STRW, insn[0]) || THUMB2_INSN_MATCH (STRBW, insn[0]) ||
888 THUMB2_INSN_MATCH (STRHW, insn[0]) || THUMB2_INSN_MATCH (STRHW1, insn[0])) &&
889 (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RT(insn[0]) == 15)) ||
890 ((THUMB2_INSN_MATCH (STRT, insn[0]) || THUMB2_INSN_MATCH (STRHT, insn[0])) &&
891 (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RT(insn[0]) == 15)) )
893 uregs = 0xf000; // Rt 12-15
896 else if ((THUMB2_INSN_MATCH (LDRD, insn[0]) || THUMB2_INSN_MATCH (LDRD1, insn[0])) && (THUMB2_INSN_REG_RN(insn[0]) == 15))
898 uregs = 0xff00; // Rt 12-15, Rt2 8-11
901 else if (THUMB2_INSN_MATCH (MUL, insn[0]) && THUMB2_INSN_REG_RM(insn[0]) == 15)
906 else if (THUMB2_INSN_MATCH (DP, insn[0]) && (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RM(insn[0]) == 15))
908 uregs = 0xf000; // Rd 12-15
911 else if (THUMB2_INSN_MATCH(STRD, insn[0]) && ((THUMB2_INSN_REG_RN(insn[0]) == 15) || (THUMB2_INSN_REG_RT(insn[0]) == 15) || THUMB2_INSN_REG_RT2(insn[0]) == 15))
913 uregs = 0xff00; // Rt 12-15, Rt2 8-11
916 else if (THUMB2_INSN_MATCH (RSBW, insn[0]) && THUMB2_INSN_REG_RN(insn[0]) == 15)
918 uregs = 0x0f00; // Rd 8-11
921 else if (THUMB2_INSN_MATCH (RORW, insn[0]) && (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RM(insn[0]) == 15))
926 else if ((THUMB2_INSN_MATCH (ROR, insn[0]) || THUMB2_INSN_MATCH(LSLW2, insn[0]) || THUMB2_INSN_MATCH(LSRW2, insn[0])) && THUMB2_INSN_REG_RM(insn[0]) == 15)
928 uregs = 0x0f00; // Rd 8-11
931 else if ((THUMB2_INSN_MATCH (LSLW1, insn[0]) || THUMB2_INSN_MATCH (LSRW1, insn[0])) && (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RM(insn[0]) == 15))
933 uregs = 0x0f00; // Rd 8-11
936 else if ((THUMB2_INSN_MATCH (TEQ1, insn[0]) || THUMB2_INSN_MATCH (TST1, insn[0])) && THUMB2_INSN_REG_RN(insn[0]) == 15)
938 uregs = 0xf0000; //Rn 0-3 (16-19)
941 else if ((THUMB2_INSN_MATCH (TEQ2, insn[0]) || THUMB2_INSN_MATCH (TST2, insn[0])) &&
942 (THUMB2_INSN_REG_RN(insn[0]) == 15 || THUMB2_INSN_REG_RM(insn[0]) == 15))
944 uregs = 0xf0000; //Rn 0-3 (16-19)
947 if (unlikely(uregs && pc_dep))
949 memcpy (insns, pc_dep_insn_execbuf_thumb, 18 * 2);
950 if (prep_pc_dep_insn_execbuf_thumb (insns, insn[0], uregs) != 0)
952 printk("Error in %s at %d: failed to prepare exec buffer for insn %lx!",
953 __FILE__, __LINE__, insn[0]);
955 //free_insn_slot (&uprobe_insn_pages, task, p->ainsn.insn_thumb, 0);
958 addr = ((unsigned int)p->addr) + 4;
959 *((unsigned short*)insns + 13) = 0xdeff;
960 *((unsigned short*)insns + 14) = addr & 0x0000ffff;
961 *((unsigned short*)insns + 15) = addr >> 16;
962 if (!isThumb2(insn[0]))
964 addr = ((unsigned int)p->addr) + 2;
965 *((unsigned short*)insns + 16) = (addr & 0x0000ffff) | 0x1;
966 *((unsigned short*)insns + 17) = addr >> 16;
969 addr = ((unsigned int)p->addr) + 4;
970 *((unsigned short*)insns + 16) = (addr & 0x0000ffff) | 0x1;
971 *((unsigned short*)insns + 17) = addr >> 16;
975 memcpy (insns, gen_insn_execbuf_thumb, 18 * 2);
976 *((unsigned short*)insns + 13) = 0xdeff;
977 if (!isThumb2(insn[0]))
979 addr = ((unsigned int)p->addr) + 2;
980 *((unsigned short*)insns + 2) = insn[0];
981 *((unsigned short*)insns + 16) = (addr & 0x0000ffff) | 0x1;
982 *((unsigned short*)insns + 17) = addr >> 16;
985 addr = ((unsigned int)p->addr) + 4;
987 *((unsigned short*)insns + 16) = (addr & 0x0000ffff) | 0x1;
988 *((unsigned short*)insns + 17) = addr >> 16;
991 if (!write_proc_vm_atomic (task, (unsigned long) p->ainsn.insn_thumb, insns, 18 * 2))
993 panic("failed to write memory %p!\n", p->ainsn.insn_thumb);
994 // Mr_Nobody: we have to panic, really??...
995 //free_insn_slot (&uprobe_insn_pages, task, p->ainsn.insn_thumb, 0);
1001 static int check_validity_insn(struct kprobe *p, struct pt_regs *regs, struct task_struct *task)
1005 if (unlikely(thumb_mode(regs))) {
1006 if (p->safe_thumb != -1) {
1007 p->ainsn.insn = p->ainsn.insn_thumb;
1008 list_for_each_entry_rcu(kp, &p->list, list) {
1009 kp->ainsn.insn = p->ainsn.insn_thumb;
1012 printk("Error in %s at %d: we are in thumb mode (!) and check instruction was fail \
1013 (%0lX instruction at %p address)!\n", __FILE__, __LINE__, p->opcode, p->addr);
1014 // Test case when we do our actions on already running application
1015 arch_disarm_uprobe(p, task);
1019 if (p->safe_arm != -1) {
1020 p->ainsn.insn = p->ainsn.insn_arm;
1021 list_for_each_entry_rcu(kp, &p->list, list) {
1022 kp->ainsn.insn = p->ainsn.insn_arm;
1025 printk("Error in %s at %d: we are in arm mode (!) and check instruction was fail \
1026 (%0lX instruction at %p address)!\n", __FILE__, __LINE__, p->opcode, p->addr);
1027 // Test case when we do our actions on already running application
1028 arch_disarm_uprobe(p, task);
1036 static int kprobe_trap_handler(struct pt_regs *regs, unsigned int instr)
1039 unsigned long flags;
1040 local_irq_save(flags);
1041 ret = kprobe_handler(regs);
1042 local_irq_restore(flags);
1046 #ifdef TRAP_OVERHEAD_DEBUG
1047 static unsigned long trap_handler_counter_debug = 0;
1048 #define SAMPLING_COUNTER 100000
1051 int kprobe_handler(struct pt_regs *regs)
1054 char *msg_out = NULL;
1055 unsigned long user_m = user_mode(regs);
1056 pid_t tgid = (user_m) ? current->tgid : 0;
1057 kprobe_opcode_t *addr = (kprobe_opcode_t *) (regs->ARM_pc);
1059 struct kprobe *p = NULL, *p_run = NULL;
1060 int ret = 0, retprobe = 0, reenter = 0;
1061 kprobe_opcode_t *ssaddr = NULL;
1062 struct kprobe_ctlblk *kcb;
1064 #ifdef SUPRESS_BUG_MESSAGES
1065 int swap_oops_in_progress;
1066 // oops_in_progress used to avoid BUG() messages that slow down kprobe_handler() execution
1067 swap_oops_in_progress = oops_in_progress;
1068 oops_in_progress = 1;
1070 #ifdef TRAP_OVERHEAD_DEBUG
1071 trap_handler_counter_debug++;
1072 if ( trap_handler_counter_debug < SAMPLING_COUNTER ) {
1076 // XXX NOTE - user must care about catching signal via signal handler to avoid hanging!
1077 printk("Trap %ld reached - send SIGUSR1\n", trap_handler_counter_debug);
1078 kill_pid(get_task_pid(current, PIDTYPE_PID), SIGUSR1, 1);
1079 trap_handler_counter_debug = 0;
1084 #ifdef OVERHEAD_DEBUG
1085 struct timeval swap_tv1;
1086 struct timeval swap_tv2;
1087 #define USEC_IN_SEC_NUM 1000000
1088 do_gettimeofday(&swap_tv1);
1092 // printk("### kprobe_handler: task[tgid=%u (%s)] addr=%p\n", tgid, current->comm, addr);
1093 p = get_kprobe(addr, tgid);
1095 if (user_m && p && (check_validity_insn(p, regs, current) != 0)) {
1096 goto no_kprobe_live;
1099 /* We're in an interrupt, but this is clear and BUG()-safe. */
1100 kcb = get_kprobe_ctlblk ();
1102 /* Check we're not actually recursing */
1103 // TODO: event is not saving in trace
1104 p_run = kprobe_running();
1107 DBPRINTF("lock???");
1110 if (!tgid && (addr == (kprobe_opcode_t *)kretprobe_trampoline)) {
1111 save_previous_kprobe(kcb, p_run);
1112 kcb->kprobe_status = KPROBE_REENTER;
1115 /* We have reentered the kprobe_handler(), since
1116 * another probe was hit while within the handler.
1117 * We here save the original kprobes variables and
1118 * just single step on the instruction of the new probe
1119 * without calling any user handlers.
1121 kprobes_inc_nmissed_count (p);
1122 prepare_singlestep (p, regs);
1128 if(tgid) { //we can reenter probe upon uretprobe exception
1129 DBPRINTF ("check for UNDEF_INSTRUCTION %p\n", addr);
1130 // UNDEF_INSTRUCTION from user space
1132 p = get_kprobe_by_insn_slot(addr, tgid, regs);
1134 save_previous_kprobe(kcb, p_run);
1135 kcb->kprobe_status = KPROBE_REENTER;
1138 DBPRINTF ("uretprobe %p\n", addr);
1143 DBPRINTF ("kprobe_running !!! p = 0x%p p->break_handler = 0x%p", p, p->break_handler);
1144 /*if (p->break_handler && p->break_handler(p, regs)) {
1145 DBPRINTF("kprobe_running !!! goto ss");
1148 DBPRINTF ("unknown uprobe at %p cur at %p/%p\n", addr, p->addr, p->ainsn.insn);
1150 ssaddr = p->ainsn.insn + UPROBES_TRAMP_SS_BREAK_IDX;
1152 ssaddr = p->ainsn.insn + KPROBES_TRAMP_SS_BREAK_IDX;
1153 if (addr == ssaddr) {
1154 regs->ARM_pc = (unsigned long) (p->addr + 1);
1155 DBPRINTF ("finish step at %p cur at %p/%p, redirect to %lx\n", addr, p->addr, p->ainsn.insn, regs->ARM_pc);
1156 if (kcb->kprobe_status == KPROBE_REENTER) {
1157 restore_previous_kprobe(kcb);
1159 reset_current_kprobe();
1162 DBPRINTF ("kprobe_running !!! goto no");
1164 /* If it's not ours, can't be delete race, (we hold lock). */
1165 DBPRINTF ("no_kprobe");
1173 DBPRINTF ("search UNDEF_INSTRUCTION %p\n", addr);
1174 // UNDEF_INSTRUCTION from user space
1176 p = get_kprobe_by_insn_slot(addr, tgid, regs);
1178 /* Not one of ours: let kernel handle it */
1179 DBPRINTF ("no_kprobe");
1183 DBPRINTF ("uretprobe %p\n", addr);
1185 /* Not one of ours: let kernel handle it */
1186 DBPRINTF ("no_kprobe");
1190 // restore opcode for thumb app
1191 if (user_mode( regs ) && thumb_mode( regs )) {
1192 if (!isThumb2(p->opcode)) {
1193 unsigned long tmp = p->opcode >> 16;
1194 write_proc_vm_atomic(current, (unsigned long)((unsigned short*)p->addr + 1), &tmp, 2);
1196 // "2*sizeof(kprobe_opcode_t)" - strange. Should be "sizeof(kprobe_opcode_t)", need to test
1197 flush_icache_range((unsigned int) p->addr, ((unsigned int)p->addr) + (2 * sizeof(kprobe_opcode_t)));
1200 set_current_kprobe(p, NULL, NULL);
1202 kcb->kprobe_status = KPROBE_HIT_ACTIVE;
1203 if (retprobe) { //(einsn == UNDEF_INSTRUCTION)
1204 ret = trampoline_probe_handler (p, regs);
1205 } else if (p->pre_handler) {
1206 ret = p->pre_handler (p, regs);
1207 if(p->pre_handler != trampoline_probe_handler) {
1208 reset_current_kprobe();
1213 /* handler has already set things up, so skip ss setup */
1219 msg_out = "no_kprobe\n";
1220 err_out = 1; // return with death
1224 msg_out = "no_kprobe live\n";
1225 err_out = 0; // ok - life is life
1229 preempt_enable_no_resched();
1230 #ifdef OVERHEAD_DEBUG
1231 do_gettimeofday(&swap_tv2);
1233 swap_sum_time += ((swap_tv2.tv_sec - swap_tv1.tv_sec) * USEC_IN_SEC_NUM +
1234 (swap_tv2.tv_usec - swap_tv1.tv_usec));
1236 #ifdef SUPRESS_BUG_MESSAGES
1237 oops_in_progress = swap_oops_in_progress;
1247 int setjmp_pre_handler (struct kprobe *p, struct pt_regs *regs)
1249 struct jprobe *jp = container_of (p, struct jprobe, kp);
1250 kprobe_pre_entry_handler_t pre_entry;
1251 entry_point_t entry;
1254 // p = kprobe_running(regs);
1257 DBPRINTF ("pjp = 0x%p jp->entry = 0x%p", jp, jp->entry);
1258 entry = (entry_point_t) jp->entry;
1259 pre_entry = (kprobe_pre_entry_handler_t) jp->pre_entry;
1261 // DIE("entry NULL", regs)
1262 DBPRINTF ("entry = 0x%p jp->entry = 0x%p", entry, jp->entry);
1264 //call handler for all kernel probes and user space ones which belong to current tgid
1265 if (!p->tgid || (p->tgid == current->tgid))
1267 if(!p->tgid && ((unsigned int)p->addr == sched_addr) && sched_rp) {
1268 struct thread_info *tinfo = (struct thread_info *)regs->ARM_r2;
1269 patch_suspended_task(sched_rp, tinfo->task);
1272 p->ss_addr = (void *)pre_entry (jp->priv_arg, regs);
1274 entry (regs->ARM_r0, regs->ARM_r1, regs->ARM_r2, regs->ARM_r3, regs->ARM_r4, regs->ARM_r5);
1278 dbi_arch_uprobe_return ();
1280 dbi_jprobe_return ();
1284 dbi_arch_uprobe_return ();
1286 prepare_singlestep (p, regs);
1290 EXPORT_SYMBOL_GPL(setjmp_pre_handler);
1292 void dbi_jprobe_return (void)
1296 void dbi_arch_uprobe_return (void)
1299 EXPORT_SYMBOL_GPL(dbi_arch_uprobe_return);
1301 int longjmp_break_handler (struct kprobe *p, struct pt_regs *regs)
1304 //kprobe_opcode_t insn = BREAKPOINT_INSTRUCTION;
1305 kprobe_opcode_t insns[2];
1309 insns[0] = BREAKPOINT_INSTRUCTION;
1310 insns[1] = p->opcode;
1311 //p->opcode = *p->addr;
1312 if (read_proc_vm_atomic (current, (unsigned long) (p->addr), &(p->opcode), sizeof (p->opcode)) < sizeof (p->opcode))
1314 printk ("ERROR[%lu]: failed to read vm of proc %s/%u addr %p.", nCount, current->comm, current->pid, p->addr);
1317 //*p->addr = BREAKPOINT_INSTRUCTION;
1318 //*(p->addr+1) = p->opcode;
1319 if (write_proc_vm_atomic (current, (unsigned long) (p->addr), insns, sizeof (insns)) < sizeof (insns))
1321 printk ("ERROR[%lu]: failed to write vm of proc %s/%u addr %p.", nCount, current->comm, current->pid, p->addr);
1327 DBPRINTF ("p->opcode = 0x%lx *p->addr = 0x%lx p->addr = 0x%p\n", p->opcode, *p->addr, p->addr);
1328 *(p->addr + 1) = p->opcode;
1329 p->opcode = *p->addr;
1330 *p->addr = BREAKPOINT_INSTRUCTION;
1332 flush_icache_range ((unsigned int) p->addr, (unsigned int) (((unsigned int) p->addr) + (sizeof (kprobe_opcode_t) * 2)));
1335 reset_current_kprobe();
1341 EXPORT_SYMBOL_GPL(longjmp_break_handler);
1343 void arch_arm_kprobe (struct kprobe *p)
1345 *p->addr = BREAKPOINT_INSTRUCTION;
1346 flush_icache_range ((unsigned long) p->addr, (unsigned long) p->addr + sizeof (kprobe_opcode_t));
1349 void arch_disarm_kprobe (struct kprobe *p)
1351 *p->addr = p->opcode;
1352 flush_icache_range ((unsigned long) p->addr, (unsigned long) p->addr + sizeof (kprobe_opcode_t));
1356 int trampoline_probe_handler (struct kprobe *p, struct pt_regs *regs)
1358 struct kretprobe_instance *ri = NULL;
1359 struct hlist_head *head;
1360 struct hlist_node *node, *tmp;
1361 unsigned long flags, orig_ret_address = 0;
1362 unsigned long trampoline_address = (unsigned long) &kretprobe_trampoline;
1364 struct kretprobe *crp = NULL;
1365 struct kprobe_ctlblk *kcb = get_kprobe_ctlblk ();
1370 // in case of user space retprobe trampoline is at the Nth instruction of US tramp
1371 if (!thumb_mode( regs ))
1372 trampoline_address = (unsigned long)(p->ainsn.insn + UPROBES_TRAMP_RET_BREAK_IDX);
1374 trampoline_address = (unsigned long)(p->ainsn.insn) + 0x1b;
1377 spin_lock_irqsave (&kretprobe_lock, flags);
1380 * We are using different hash keys (current and mm) for finding kernel
1381 * space and user space probes. Kernel space probes can change mm field in
1382 * task_struct. User space probes can be shared between threads of one
1383 * process so they have different current but same mm.
1386 head = kretprobe_inst_table_head(current->mm);
1388 head = kretprobe_inst_table_head(current);
1392 * It is possible to have multiple instances associated with a given
1393 * task either because an multiple functions in the call path
1394 * have a return probe installed on them, and/or more then one
1395 * return probe was registered for a target function.
1397 * We can handle this because:
1398 * - instances are always inserted at the head of the list
1399 * - when multiple return probes are registered for the same
1400 * function, the first instance's ret_addr will point to the
1401 * real return address, and all the rest will point to
1402 * kretprobe_trampoline
1404 hlist_for_each_entry_safe (ri, node, tmp, head, hlist)
1406 if (ri->task != current)
1407 /* another task is sharing our hash bucket */
1409 if (ri->rp && ri->rp->handler){
1410 ri->rp->handler (ri, regs, ri->rp->priv_arg);
1413 orig_ret_address = (unsigned long) ri->ret_addr;
1414 recycle_rp_inst (ri);
1415 if (orig_ret_address != trampoline_address)
1417 * This is the real return address. Any other
1418 * instances associated with this task are for
1419 * other calls deeper on the call stack
1423 kretprobe_assert (ri, orig_ret_address, trampoline_address);
1424 //BUG_ON(!orig_ret_address || (orig_ret_address == trampoline_address));
1425 //E.G. Check this code in case of __switch_to function instrumentation -- currently this code generates dump in this case
1426 //if (trampoline_address != (unsigned long) &kretprobe_trampoline){
1427 //if (ri->rp2) BUG_ON (ri->rp2->kp.tgid == 0);
1428 //if (ri->rp) BUG_ON (ri->rp->kp.tgid == 0);
1429 //else if (ri->rp2) BUG_ON (ri->rp2->kp.tgid == 0);
1431 if ((ri->rp && ri->rp->kp.tgid) || (ri->rp2 && ri->rp2->kp.tgid))
1432 BUG_ON (trampoline_address == (unsigned long) &kretprobe_trampoline);
1434 regs->uregs[14] = orig_ret_address;
1435 DBPRINTF ("regs->uregs[14] = 0x%lx\n", regs->uregs[14]);
1436 DBPRINTF ("regs->uregs[15] = 0x%lx\n", regs->uregs[15]);
1438 if (trampoline_address != (unsigned long) &kretprobe_trampoline)
1440 regs->uregs[15] = orig_ret_address;
1442 if (!thumb_mode( regs )) regs->uregs[15] += 4;
1443 else regs->uregs[15] += 2;
1446 DBPRINTF ("regs->uregs[15] = 0x%lx\n", regs->uregs[15]);
1448 if(p){ // ARM, MIPS, X86 user space
1449 if (thumb_mode( regs ) && !(regs->uregs[14] & 0x01))
1451 regs->ARM_cpsr &= 0xFFFFFFDF;
1453 if (user_mode( regs ) && (regs->uregs[14] & 0x01))
1455 regs->ARM_cpsr |= 0x20;
1459 //TODO: test - enter function, delete us retprobe, exit function
1460 // for user space retprobes only - deferred deletion
1462 if (trampoline_address != (unsigned long) &kretprobe_trampoline)
1464 // if we are not at the end of the list and current retprobe should be disarmed
1465 if (node && ri->rp2)
1467 struct hlist_node *current_node = node;
1469 /*sprintf(die_msg, "deferred disarm p->addr = %p [%lx %lx %lx]\n",
1470 crp->kp.addr, *kaddrs[0], *kaddrs[1], *kaddrs[2]);
1471 DIE(die_msg, regs); */
1472 // look for other instances for the same retprobe
1473 hlist_for_each_entry_safe (ri, node, tmp, head, hlist)
1476 * Trying to find another retprobe instance associated with
1477 * the same retprobe.
1479 if (ri->rp2 == crp && node != current_node)
1485 // if there are no more instances for this retprobe
1487 struct kprobe *is_p = &crp->kp;
1488 DBPRINTF ("defered retprobe deletion p->addr = %p", crp->kp.addr);
1490 If there is no any retprobe instances of this retprobe
1491 we can free the resources related to the probe.
1493 if (!(hlist_unhashed(&is_p->is_hlist_arm))) {
1494 hlist_del_rcu(&is_p->is_hlist_arm);
1496 if (!(hlist_unhashed(&is_p->is_hlist_thumb))) {
1497 hlist_del_rcu(&is_p->is_hlist_thumb);
1500 dbi_unregister_kprobe(&crp->kp, current);
1503 hlist_del(current_node);
1507 if (kcb->kprobe_status == KPROBE_REENTER) {
1508 restore_previous_kprobe(kcb);
1510 reset_current_kprobe();
1514 spin_unlock_irqrestore (&kretprobe_lock, flags);
1517 * By returning a non-zero value, we are telling
1518 * kprobe_handler() that we don't want the post_handler
1519 * to run (and have re-enabled preemption)
1525 void __arch_prepare_kretprobe (struct kretprobe *rp, struct pt_regs *regs)
1527 struct kretprobe_instance *ri;
1529 DBPRINTF ("start\n");
1530 //TODO: test - remove retprobe after func entry but before its exit
1531 if ((ri = get_free_rp_inst (rp)) != NULL)
1536 ri->ret_addr = (kprobe_opcode_t *) regs->uregs[14];
1537 ri->sp = (kprobe_opcode_t *)regs->ARM_sp; //uregs[13];
1540 if (!thumb_mode( regs ))
1541 regs->uregs[14] = (unsigned long) (rp->kp.ainsn.insn + UPROBES_TRAMP_RET_BREAK_IDX);
1543 regs->uregs[14] = (unsigned long) (rp->kp.ainsn.insn) + 0x1b;
1545 else /* Replace the return addr with trampoline addr */
1546 regs->uregs[14] = (unsigned long) &kretprobe_trampoline;
1548 // DBPRINTF ("ret addr set to %p->%lx\n", ri->ret_addr, regs->uregs[14]);
1552 DBPRINTF ("WARNING: missed retprobe %p\n", rp->kp.addr);
1558 int asm_init_module_dependencies(void)
1560 //No module dependencies
1564 typedef void (* kpro_type)(struct undef_hook *);
1565 static kpro_type do_kpro;
1566 static kpro_type undo_kpro;
1568 // kernel probes hook
1569 static struct undef_hook undef_ho_k = {
1570 .instr_mask = 0xffffffff,
1571 .instr_val = BREAKPOINT_INSTRUCTION,
1572 .cpsr_mask = MODE_MASK,
1573 .cpsr_val = SVC_MODE,
1574 .fn = kprobe_trap_handler
1577 // userspace probes hook (arm)
1578 static struct undef_hook undef_ho_u = {
1579 .instr_mask = 0xffffffff,
1580 .instr_val = BREAKPOINT_INSTRUCTION,
1581 .cpsr_mask = MODE_MASK,
1582 .cpsr_val = USR_MODE,
1583 .fn = kprobe_trap_handler
1586 // userspace probes hook (thumb)
1587 static struct undef_hook undef_ho_u_t = {
1588 .instr_mask = 0xffffffff,
1589 .instr_val = BREAKPOINT_INSTRUCTION & 0x0000ffff,
1590 .cpsr_mask = MODE_MASK,
1591 .cpsr_val = USR_MODE,
1592 .fn = kprobe_trap_handler
1595 int __init arch_init_kprobes (void)
1597 unsigned int do_bp_handler = 0;
1600 if (arch_init_module_dependencies())
1602 DBPRINTF ("Unable to init module dependencies\n");
1606 do_bp_handler = swap_ksyms("do_undefinstr");
1607 if (do_bp_handler == 0) {
1608 DBPRINTF("no do_undefinstr symbol found!");
1611 arr_traps_template[NOTIFIER_CALL_CHAIN_INDEX] = arch_construct_brunch ((unsigned int)kprobe_handler, do_bp_handler + NOTIFIER_CALL_CHAIN_INDEX * 4, 1);
1612 // Register hooks (kprobe_handler)
1613 do_kpro = (kpro_type)swap_ksyms("register_undef_hook");
1614 if (do_kpro == NULL) {
1615 printk("no register_undef_hook symbol found!\n");
1619 // Unregister hooks (kprobe_handler)
1620 undo_kpro = (kpro_type)swap_ksyms("unregister_undef_hook");
1621 if (undo_kpro == NULL) {
1622 printk("no unregister_undef_hook symbol found!\n");
1626 do_kpro(&undef_ho_k);
1627 do_kpro(&undef_ho_u);
1628 do_kpro(&undef_ho_u_t);
1629 if ((ret = dbi_register_kprobe (&trampoline_p)) != 0) {
1630 //dbi_unregister_jprobe(&do_exit_p, 0);
1636 void __exit dbi_arch_exit_kprobes (void)
1638 undo_kpro(&undef_ho_u_t);
1639 undo_kpro(&undef_ho_u);
1640 undo_kpro(&undef_ho_k);
1643 //EXPORT_SYMBOL_GPL (dbi_arch_uprobe_return);
1644 //EXPORT_SYMBOL_GPL (dbi_arch_exit_kprobes);