kprobes.h 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. #ifndef _LINUX_KPROBES_H
  2. #define _LINUX_KPROBES_H
  3. /*
  4. * Kernel Probes (KProbes)
  5. * include/linux/kprobes.h
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * This program is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  20. *
  21. * Copyright (C) IBM Corporation, 2002, 2004
  22. *
  23. * 2002-Oct Created by Vamsi Krishna S <vamsi_krishna@in.ibm.com> Kernel
  24. * Probes initial implementation ( includes suggestions from
  25. * Rusty Russell).
  26. * 2004-July Suparna Bhattacharya <suparna@in.ibm.com> added jumper probes
  27. * interface to access function arguments.
  28. * 2005-May Hien Nguyen <hien@us.ibm.com> and Jim Keniston
  29. * <jkenisto@us.ibm.com> and Prasanna S Panchamukhi
  30. * <prasanna@in.ibm.com> added function-return probes.
  31. */
  32. #include <linux/config.h>
  33. #include <linux/list.h>
  34. #include <linux/notifier.h>
  35. #include <linux/smp.h>
  36. #include <asm/kprobes.h>
  37. /* kprobe_status settings */
  38. #define KPROBE_HIT_ACTIVE 0x00000001
  39. #define KPROBE_HIT_SS 0x00000002
  40. #define KPROBE_REENTER 0x00000004
  41. #define KPROBE_HIT_SSDONE 0x00000008
  42. struct kprobe;
  43. struct pt_regs;
  44. struct kretprobe;
  45. struct kretprobe_instance;
  46. typedef int (*kprobe_pre_handler_t) (struct kprobe *, struct pt_regs *);
  47. typedef int (*kprobe_break_handler_t) (struct kprobe *, struct pt_regs *);
  48. typedef void (*kprobe_post_handler_t) (struct kprobe *, struct pt_regs *,
  49. unsigned long flags);
  50. typedef int (*kprobe_fault_handler_t) (struct kprobe *, struct pt_regs *,
  51. int trapnr);
  52. typedef int (*kretprobe_handler_t) (struct kretprobe_instance *,
  53. struct pt_regs *);
  54. struct kprobe {
  55. struct hlist_node hlist;
  56. /* list of kprobes for multi-handler support */
  57. struct list_head list;
  58. /*count the number of times this probe was temporarily disarmed */
  59. unsigned long nmissed;
  60. /* location of the probe point */
  61. kprobe_opcode_t *addr;
  62. /* Called before addr is executed. */
  63. kprobe_pre_handler_t pre_handler;
  64. /* Called after addr is executed, unless... */
  65. kprobe_post_handler_t post_handler;
  66. /* ... called if executing addr causes a fault (eg. page fault).
  67. * Return 1 if it handled fault, otherwise kernel will see it. */
  68. kprobe_fault_handler_t fault_handler;
  69. /* ... called if breakpoint trap occurs in probe handler.
  70. * Return 1 if it handled break, otherwise kernel will see it. */
  71. kprobe_break_handler_t break_handler;
  72. /* Saved opcode (which has been replaced with breakpoint) */
  73. kprobe_opcode_t opcode;
  74. /* copy of the original instruction */
  75. struct arch_specific_insn ainsn;
  76. };
  77. /*
  78. * Special probe type that uses setjmp-longjmp type tricks to resume
  79. * execution at a specified entry with a matching prototype corresponding
  80. * to the probed function - a trick to enable arguments to become
  81. * accessible seamlessly by probe handling logic.
  82. * Note:
  83. * Because of the way compilers allocate stack space for local variables
  84. * etc upfront, regardless of sub-scopes within a function, this mirroring
  85. * principle currently works only for probes placed on function entry points.
  86. */
  87. struct jprobe {
  88. struct kprobe kp;
  89. kprobe_opcode_t *entry; /* probe handling code to jump to */
  90. };
  91. #ifdef ARCH_SUPPORTS_KRETPROBES
  92. extern int trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs);
  93. extern void trampoline_post_handler(struct kprobe *p, struct pt_regs *regs,
  94. unsigned long flags);
  95. extern struct task_struct *arch_get_kprobe_task(void *ptr);
  96. extern void arch_prepare_kretprobe(struct kretprobe *rp, struct pt_regs *regs);
  97. extern void arch_kprobe_flush_task(struct task_struct *tk);
  98. #else /* ARCH_SUPPORTS_KRETPROBES */
  99. static inline void kretprobe_trampoline(void)
  100. {
  101. }
  102. static inline int trampoline_probe_handler(struct kprobe *p,
  103. struct pt_regs *regs)
  104. {
  105. return 0;
  106. }
  107. static inline void trampoline_post_handler(struct kprobe *p,
  108. struct pt_regs *regs, unsigned long flags)
  109. {
  110. }
  111. static inline void arch_prepare_kretprobe(struct kretprobe *rp,
  112. struct pt_regs *regs)
  113. {
  114. }
  115. static inline void arch_kprobe_flush_task(struct task_struct *tk)
  116. {
  117. }
  118. #define arch_get_kprobe_task(ptr) ((struct task_struct *)NULL)
  119. #endif /* ARCH_SUPPORTS_KRETPROBES */
  120. /*
  121. * Function-return probe -
  122. * Note:
  123. * User needs to provide a handler function, and initialize maxactive.
  124. * maxactive - The maximum number of instances of the probed function that
  125. * can be active concurrently.
  126. * nmissed - tracks the number of times the probed function's return was
  127. * ignored, due to maxactive being too low.
  128. *
  129. */
  130. struct kretprobe {
  131. struct kprobe kp;
  132. kretprobe_handler_t handler;
  133. int maxactive;
  134. int nmissed;
  135. struct hlist_head free_instances;
  136. struct hlist_head used_instances;
  137. };
  138. struct kretprobe_instance {
  139. struct hlist_node uflist; /* either on free list or used list */
  140. struct hlist_node hlist;
  141. struct kretprobe *rp;
  142. void *ret_addr;
  143. void *stack_addr;
  144. };
  145. #ifdef CONFIG_KPROBES
  146. /* Locks kprobe: irq must be disabled */
  147. void lock_kprobes(void);
  148. void unlock_kprobes(void);
  149. /* kprobe running now on this CPU? */
  150. static inline int kprobe_running(void)
  151. {
  152. extern unsigned int kprobe_cpu;
  153. return kprobe_cpu == smp_processor_id();
  154. }
  155. extern int arch_prepare_kprobe(struct kprobe *p);
  156. extern void arch_copy_kprobe(struct kprobe *p);
  157. extern void arch_arm_kprobe(struct kprobe *p);
  158. extern void arch_disarm_kprobe(struct kprobe *p);
  159. extern void arch_remove_kprobe(struct kprobe *p);
  160. extern void show_registers(struct pt_regs *regs);
  161. /* Get the kprobe at this addr (if any). Must have called lock_kprobes */
  162. struct kprobe *get_kprobe(void *addr);
  163. struct hlist_head * kretprobe_inst_table_head(struct task_struct *tsk);
  164. int register_kprobe(struct kprobe *p);
  165. void unregister_kprobe(struct kprobe *p);
  166. int setjmp_pre_handler(struct kprobe *, struct pt_regs *);
  167. int longjmp_break_handler(struct kprobe *, struct pt_regs *);
  168. int register_jprobe(struct jprobe *p);
  169. void unregister_jprobe(struct jprobe *p);
  170. void jprobe_return(void);
  171. int register_kretprobe(struct kretprobe *rp);
  172. void unregister_kretprobe(struct kretprobe *rp);
  173. struct kretprobe_instance *get_free_rp_inst(struct kretprobe *rp);
  174. struct kretprobe_instance *get_rp_inst(void *sara);
  175. struct kretprobe_instance *get_rp_inst_tsk(struct task_struct *tk);
  176. void add_rp_inst(struct kretprobe_instance *ri);
  177. void kprobe_flush_task(struct task_struct *tk);
  178. void recycle_rp_inst(struct kretprobe_instance *ri);
  179. #else /* CONFIG_KPROBES */
  180. static inline int kprobe_running(void)
  181. {
  182. return 0;
  183. }
  184. static inline int register_kprobe(struct kprobe *p)
  185. {
  186. return -ENOSYS;
  187. }
  188. static inline void unregister_kprobe(struct kprobe *p)
  189. {
  190. }
  191. static inline int register_jprobe(struct jprobe *p)
  192. {
  193. return -ENOSYS;
  194. }
  195. static inline void unregister_jprobe(struct jprobe *p)
  196. {
  197. }
  198. static inline void jprobe_return(void)
  199. {
  200. }
  201. static inline int register_kretprobe(struct kretprobe *rp)
  202. {
  203. return -ENOSYS;
  204. }
  205. static inline void unregister_kretprobe(struct kretprobe *rp)
  206. {
  207. }
  208. static inline void kprobe_flush_task(struct task_struct *tk)
  209. {
  210. }
  211. #endif /* CONFIG_KPROBES */
  212. #endif /* _LINUX_KPROBES_H */