3 * modules/us_manager/helper.c
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 * Copyright (C) Samsung Electronics, 2013
21 * 2013 Vyacheslav Cherkashin: SWAP us_manager implement
26 #include <kprobe/dbi_kprobes.h>
27 #include <kprobe/dbi_kprobes_deps.h>
28 #include <ksyms/ksyms.h>
29 #include <writer/kernel_operations.h>
30 #include <writer/swap_writer_module.h>
31 #include "us_slot_manager.h"
32 #include "sspt/sspt.h"
37 struct task_struct *check_task(struct task_struct *task);
39 static atomic_t stop_flag = ATOMIC_INIT(0);
43 ******************************************************************************
45 ******************************************************************************
52 static int entry_handler_mf(struct kretprobe_instance *ri, struct pt_regs *regs)
54 struct pf_data *data = (struct pf_data *)ri->data;
56 data->addr = swap_get_karg(regs, 2);
61 /* Detects when IPs are really loaded into phy mem and installs probes. */
62 static int ret_handler_mf(struct kretprobe_instance *ri, struct pt_regs *regs)
64 struct task_struct *task = current;
65 unsigned long page_addr;
70 /* TODO: check return value */
71 page_addr = ((struct pf_data *)ri->data)->addr & PAGE_MASK;
72 call_page_fault(task, page_addr);
77 static struct kretprobe mf_kretprobe = {
78 .entry_handler = entry_handler_mf,
79 .handler = ret_handler_mf,
80 .data_size = sizeof(struct pf_data)
83 static int register_mf(void)
87 ret = dbi_register_kretprobe(&mf_kretprobe);
89 printk("dbi_register_kretprobe(handle_mm_fault) ret=%d!\n",
95 static void unregister_mf(void)
97 dbi_unregister_kretprobe(&mf_kretprobe);
105 ******************************************************************************
107 ******************************************************************************
109 static atomic_t copy_process_cnt = ATOMIC_INIT(0);
111 static void recover_child(struct task_struct *child_task, struct sspt_proc *proc)
113 sspt_proc_uninstall(proc, child_task, US_DISARM);
114 dbi_disarm_urp_inst_for_task(current, child_task);
117 static void rm_uprobes_child(struct task_struct *task)
119 struct sspt_proc *proc;
121 sspt_proc_write_lock();
123 proc = sspt_proc_get_by_task(current);
125 recover_child(task, proc);
127 sspt_proc_write_unlock();
130 static int entry_handler_cp(struct kretprobe_instance *ri, struct pt_regs *regs)
132 atomic_inc(©_process_cnt);
134 if (atomic_read(&stop_flag))
135 call_mm_release(current);
140 /* Delete uprobs in children at fork */
141 static int ret_handler_cp(struct kretprobe_instance *ri, struct pt_regs *regs)
143 struct task_struct *task = (struct task_struct *)regs_return_value(regs);
145 if(!task || IS_ERR(task))
148 if(task->mm != current->mm) { /* check flags CLONE_VM */
149 rm_uprobes_child(task);
152 atomic_dec(©_process_cnt);
157 static struct kretprobe cp_kretprobe = {
158 .entry_handler = entry_handler_cp,
159 .handler = ret_handler_cp,
162 static int register_cp(void)
166 ret = dbi_register_kretprobe(&cp_kretprobe);
168 printk("dbi_register_kretprobe(copy_process) ret=%d!\n", ret);
173 static void unregister_cp(void)
175 dbi_unregister_kretprobe_top(&cp_kretprobe, 0);
178 } while (atomic_read(©_process_cnt));
179 dbi_unregister_kretprobe_bottom(&cp_kretprobe);
187 ******************************************************************************
189 ******************************************************************************
192 /* Detects when target process removes IPs. */
193 static int mr_pre_handler(struct kprobe *p, struct pt_regs *regs)
195 struct task_struct *task = (struct task_struct *)swap_get_karg(regs, 0);
197 if (is_kthread(task))
200 if (task->tgid != task->pid) {
204 call_mm_release(task);
209 static struct kprobe mr_kprobe = {
210 .pre_handler = mr_pre_handler
213 static int register_mr(void)
217 ret = dbi_register_kprobe(&mr_kprobe);
219 printk("dbi_register_kprobe(mm_release) ret=%d!\n", ret);
224 static void unregister_mr(void)
226 dbi_unregister_kprobe(&mr_kprobe);
234 ******************************************************************************
236 ******************************************************************************
243 static atomic_t unmap_cnt = ATOMIC_INIT(0);
245 static void __remove_unmap_probes(struct sspt_proc *proc,
246 struct unmap_data *umd)
248 struct task_struct *task = proc->task;
249 unsigned long start = umd->start;
250 size_t len = PAGE_ALIGN(umd->len);
253 if (sspt_proc_get_files_by_region(proc, &head, start, len)) {
254 struct sspt_file *file, *n;
255 unsigned long end = start + len;
257 list_for_each_entry_safe(file, n, &head, list) {
258 if (file->vm_start >= end)
261 if (file->vm_start >= start) {
262 sspt_file_uninstall(file, task, US_UNINSTALL);
264 /* TODO: uninstall pages: start..file->vm_end */
268 sspt_proc_insert_files(proc, &head);
270 proc_unmap_msg(start, end);
274 static void remove_unmap_probes(struct task_struct *task,
275 struct unmap_data *umd)
277 struct sspt_proc *proc;
279 sspt_proc_write_lock();
281 proc = sspt_proc_get_by_task(task);
283 __remove_unmap_probes(proc, umd);
285 sspt_proc_write_unlock();
288 static int entry_handler_unmap(struct kretprobe_instance *ri,
289 struct pt_regs *regs)
291 struct unmap_data *data = (struct unmap_data *)ri->data;
292 struct task_struct *task = current->group_leader;
294 atomic_inc(&unmap_cnt);
296 data->start = swap_get_karg(regs, 1);
297 data->len = (size_t)swap_get_karg(regs, 2);
299 if (!is_kthread(task) && atomic_read(&stop_flag))
300 remove_unmap_probes(task, data);
305 static int ret_handler_unmap(struct kretprobe_instance *ri,
306 struct pt_regs *regs)
308 struct task_struct *task;
310 task = current->group_leader;
311 if (is_kthread(task) ||
312 get_regs_ret_val(regs))
315 remove_unmap_probes(task, (struct unmap_data *)ri->data);
317 atomic_dec(&unmap_cnt);
322 static struct kretprobe unmap_kretprobe = {
323 .entry_handler = entry_handler_unmap,
324 .handler = ret_handler_unmap,
325 .data_size = sizeof(struct unmap_data)
328 static int register_unmap(void)
332 ret = dbi_register_kretprobe(&unmap_kretprobe);
334 printk("dbi_register_kprobe(do_munmap) ret=%d!\n", ret);
339 static void unregister_unmap(void)
341 dbi_unregister_kretprobe_top(&unmap_kretprobe, 0);
344 } while (atomic_read(&unmap_cnt));
345 dbi_unregister_kretprobe_bottom(&unmap_kretprobe);
353 ******************************************************************************
355 ******************************************************************************
357 static int ret_handler_mmap(struct kretprobe_instance *ri,
358 struct pt_regs *regs)
360 struct sspt_proc *proc;
361 struct task_struct *task;
362 unsigned long start_addr;
363 struct vm_area_struct *vma;
365 task = current->group_leader;
366 if (is_kthread(task))
369 start_addr = (unsigned long)get_regs_ret_val(regs);
370 if (IS_ERR_VALUE(start_addr))
373 proc = sspt_proc_get_by_task(task);
377 vma = find_vma_intersection(task->mm, start_addr, start_addr + 1);
378 if (vma && check_vma(vma))
384 static struct kretprobe mmap_kretprobe = {
385 .handler = ret_handler_mmap
388 static int register_mmap(void)
392 ret = dbi_register_kretprobe(&mmap_kretprobe);
394 printk("dbi_register_kretprobe(do_mmap_pgoff) ret=%d!\n", ret);
399 static void unregister_mmap(void)
401 dbi_unregister_kretprobe(&mmap_kretprobe);
408 int register_helper(void)
412 atomic_set(&stop_flag, 0);
414 /* install probe on 'do_munmap' to detect when for remove US probes */
415 ret = register_unmap();
419 /* install probe on 'mm_release' to detect when for remove US probes */
424 /* install probe on 'copy_process' to disarm children process */
429 /* install probe on 'do_mmap_pgoff' to detect when mapping file */
430 ret = register_mmap();
435 * install probe on 'handle_mm_fault' to detect when US pages will be
459 void unregister_helper_top(void)
462 atomic_set(&stop_flag, 1);
465 void unregister_helper_bottom(void)
473 int init_helper(void)
476 addr = swap_ksyms("handle_mm_fault");
478 printk("Cannot find address for handle_mm_fault function!\n");
481 mf_kretprobe.kp.addr = (kprobe_opcode_t *)addr;
483 addr = swap_ksyms_substr("copy_process");
485 printk("Cannot find address for copy_process function!\n");
488 cp_kretprobe.kp.addr = (kprobe_opcode_t *)addr;
490 addr = swap_ksyms("mm_release");
492 printk("Cannot find address for mm_release function!\n");
495 mr_kprobe.addr = (kprobe_opcode_t *)addr;
497 addr = swap_ksyms("do_munmap");
499 printk("Cannot find address for do_munmap function!\n");
502 unmap_kretprobe.kp.addr = (kprobe_opcode_t *)addr;
504 addr = swap_ksyms("do_mmap_pgoff");
506 printk("Cannot find address for do_mmap_pgoff function!\n");
509 mmap_kretprobe.kp.addr = (kprobe_opcode_t *)addr;
514 void uninit_helper(void)