xref: /openbmc/linux/arch/s390/kernel/kprobes.c (revision f9b2d96c)
1a17ae4c3SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0+
24ba069b8SMichael Grundy /*
34ba069b8SMichael Grundy  *  Kernel Probes (KProbes)
44ba069b8SMichael Grundy  *
5a53c8fabSHeiko Carstens  * Copyright IBM Corp. 2002, 2006
64ba069b8SMichael Grundy  *
74ba069b8SMichael Grundy  * s390 port, used ppc64 as template. Mike Grundy <grundym@us.ibm.com>
84ba069b8SMichael Grundy  */
94ba069b8SMichael Grundy 
109c89bb8eSMasami Hiramatsu #define pr_fmt(fmt) "kprobes: " fmt
119c89bb8eSMasami Hiramatsu 
126c6687a4SHeiko Carstens #include <linux/moduleloader.h>
134ba069b8SMichael Grundy #include <linux/kprobes.h>
144ba069b8SMichael Grundy #include <linux/ptrace.h>
154ba069b8SMichael Grundy #include <linux/preempt.h>
164ba069b8SMichael Grundy #include <linux/stop_machine.h>
171eeb66a1SChristoph Hellwig #include <linux/kdebug.h>
18a2b53673SHeiko Carstens #include <linux/uaccess.h>
19dcc096c5SPaul Gortmaker #include <linux/extable.h>
204ba069b8SMichael Grundy #include <linux/module.h>
215a0e3ad6STejun Heo #include <linux/slab.h>
22adb45839SMartin Schwidefsky #include <linux/hardirq.h>
23c933146aSHeiko Carstens #include <linux/ftrace.h>
24e6c7c630SLaura Abbott #include <asm/set_memory.h>
25a882b3b0SHeiko Carstens #include <asm/sections.h>
26a882b3b0SHeiko Carstens #include <asm/dis.h>
279a435b7bSHeiko Carstens #include "kprobes.h"
28b61e1f32SHeiko Carstens #include "entry.h"
294ba069b8SMichael Grundy 
304a188635SMartin Schwidefsky DEFINE_PER_CPU(struct kprobe *, current_kprobe);
314ba069b8SMichael Grundy DEFINE_PER_CPU(struct kprobe_ctlblk, kprobe_ctlblk);
324ba069b8SMichael Grundy 
334a188635SMartin Schwidefsky struct kretprobe_blackpoint kretprobe_blacklist[] = { };
34f438d914SMasami Hiramatsu 
35fd3d2742SGerald Schaefer static int insn_page_in_use;
36fd3d2742SGerald Schaefer 
alloc_insn_page(void)376c6687a4SHeiko Carstens void *alloc_insn_page(void)
386c6687a4SHeiko Carstens {
396c6687a4SHeiko Carstens 	void *page;
406c6687a4SHeiko Carstens 
416c6687a4SHeiko Carstens 	page = module_alloc(PAGE_SIZE);
426c6687a4SHeiko Carstens 	if (!page)
436c6687a4SHeiko Carstens 		return NULL;
44*f9b2d96cSHeiko Carstens 	set_memory_rox((unsigned long)page, 1);
456c6687a4SHeiko Carstens 	return page;
466c6687a4SHeiko Carstens }
476c6687a4SHeiko Carstens 
alloc_s390_insn_page(void)48fd3d2742SGerald Schaefer static void *alloc_s390_insn_page(void)
4963c40436SHeiko Carstens {
50fd3d2742SGerald Schaefer 	if (xchg(&insn_page_in_use, 1) == 1)
51fd3d2742SGerald Schaefer 		return NULL;
52b61e1f32SHeiko Carstens 	return &kprobes_insn_page;
5363c40436SHeiko Carstens }
5463c40436SHeiko Carstens 
free_s390_insn_page(void * page)55fd3d2742SGerald Schaefer static void free_s390_insn_page(void *page)
5663c40436SHeiko Carstens {
57fd3d2742SGerald Schaefer 	xchg(&insn_page_in_use, 0);
5863c40436SHeiko Carstens }
5963c40436SHeiko Carstens 
60fd3d2742SGerald Schaefer struct kprobe_insn_cache kprobe_s390_insn_slots = {
61fd3d2742SGerald Schaefer 	.mutex = __MUTEX_INITIALIZER(kprobe_s390_insn_slots.mutex),
62fd3d2742SGerald Schaefer 	.alloc = alloc_s390_insn_page,
63fd3d2742SGerald Schaefer 	.free = free_s390_insn_page,
64fd3d2742SGerald Schaefer 	.pages = LIST_HEAD_INIT(kprobe_s390_insn_slots.pages),
6563c40436SHeiko Carstens 	.insn_size = MAX_INSN_SIZE,
6663c40436SHeiko Carstens };
6763c40436SHeiko Carstens 
copy_instruction(struct kprobe * p)687a5388deSHeiko Carstens static void copy_instruction(struct kprobe *p)
6963c40436SHeiko Carstens {
706c6687a4SHeiko Carstens 	kprobe_opcode_t insn[MAX_INSN_SIZE];
7163c40436SHeiko Carstens 	s64 disp, new_disp;
7263c40436SHeiko Carstens 	u64 addr, new_addr;
736c6687a4SHeiko Carstens 	unsigned int len;
7463c40436SHeiko Carstens 
756c6687a4SHeiko Carstens 	len = insn_length(*p->addr >> 8);
766c6687a4SHeiko Carstens 	memcpy(&insn, p->addr, len);
776c6687a4SHeiko Carstens 	p->opcode = insn[0];
786c6687a4SHeiko Carstens 	if (probe_is_insn_relative_long(&insn[0])) {
7963c40436SHeiko Carstens 		/*
806c6687a4SHeiko Carstens 		 * For pc-relative instructions in RIL-b or RIL-c format patch
816c6687a4SHeiko Carstens 		 * the RI2 displacement field. We have already made sure that
826c6687a4SHeiko Carstens 		 * the insn slot for the patched instruction is within the same
836c6687a4SHeiko Carstens 		 * 2GB area as the original instruction (either kernel image or
846c6687a4SHeiko Carstens 		 * module area). Therefore the new displacement will always fit.
8563c40436SHeiko Carstens 		 */
866c6687a4SHeiko Carstens 		disp = *(s32 *)&insn[1];
8763c40436SHeiko Carstens 		addr = (u64)(unsigned long)p->addr;
8863c40436SHeiko Carstens 		new_addr = (u64)(unsigned long)p->ainsn.insn;
8963c40436SHeiko Carstens 		new_disp = ((addr + (disp * 2)) - new_addr) / 2;
906c6687a4SHeiko Carstens 		*(s32 *)&insn[1] = new_disp;
916c6687a4SHeiko Carstens 	}
926c6687a4SHeiko Carstens 	s390_kernel_write(p->ainsn.insn, &insn, len);
9363c40436SHeiko Carstens }
947a5388deSHeiko Carstens NOKPROBE_SYMBOL(copy_instruction);
9563c40436SHeiko Carstens 
s390_get_insn_slot(struct kprobe * p)967a5388deSHeiko Carstens static int s390_get_insn_slot(struct kprobe *p)
9763c40436SHeiko Carstens {
9863c40436SHeiko Carstens 	/*
9963c40436SHeiko Carstens 	 * Get an insn slot that is within the same 2GB area like the original
10063c40436SHeiko Carstens 	 * instruction. That way instructions with a 32bit signed displacement
10163c40436SHeiko Carstens 	 * field can be patched and executed within the insn slot.
10263c40436SHeiko Carstens 	 */
10363c40436SHeiko Carstens 	p->ainsn.insn = NULL;
10447f7c6cfSKefeng Wang 	if (is_kernel((unsigned long)p->addr))
105fd3d2742SGerald Schaefer 		p->ainsn.insn = get_s390_insn_slot();
106fcd05b50SHeiko Carstens 	else if (is_module_addr(p->addr))
10763c40436SHeiko Carstens 		p->ainsn.insn = get_insn_slot();
10863c40436SHeiko Carstens 	return p->ainsn.insn ? 0 : -ENOMEM;
10963c40436SHeiko Carstens }
1107a5388deSHeiko Carstens NOKPROBE_SYMBOL(s390_get_insn_slot);
11163c40436SHeiko Carstens 
s390_free_insn_slot(struct kprobe * p)1127a5388deSHeiko Carstens static void s390_free_insn_slot(struct kprobe *p)
11363c40436SHeiko Carstens {
11463c40436SHeiko Carstens 	if (!p->ainsn.insn)
11563c40436SHeiko Carstens 		return;
11647f7c6cfSKefeng Wang 	if (is_kernel((unsigned long)p->addr))
117fd3d2742SGerald Schaefer 		free_s390_insn_slot(p->ainsn.insn, 0);
11863c40436SHeiko Carstens 	else
11963c40436SHeiko Carstens 		free_insn_slot(p->ainsn.insn, 0);
12063c40436SHeiko Carstens 	p->ainsn.insn = NULL;
12163c40436SHeiko Carstens }
1227a5388deSHeiko Carstens NOKPROBE_SYMBOL(s390_free_insn_slot);
12363c40436SHeiko Carstens 
1244df898dcSSven Schnelle /* Check if paddr is at an instruction boundary */
can_probe(unsigned long paddr)1254df898dcSSven Schnelle static bool can_probe(unsigned long paddr)
1264df898dcSSven Schnelle {
1274df898dcSSven Schnelle 	unsigned long addr, offset = 0;
1284df898dcSSven Schnelle 	kprobe_opcode_t insn;
1294df898dcSSven Schnelle 	struct kprobe *kp;
1304df898dcSSven Schnelle 
1314df898dcSSven Schnelle 	if (paddr & 0x01)
1324df898dcSSven Schnelle 		return false;
1334df898dcSSven Schnelle 
1344df898dcSSven Schnelle 	if (!kallsyms_lookup_size_offset(paddr, NULL, &offset))
1354df898dcSSven Schnelle 		return false;
1364df898dcSSven Schnelle 
1374df898dcSSven Schnelle 	/* Decode instructions */
1384df898dcSSven Schnelle 	addr = paddr - offset;
1394df898dcSSven Schnelle 	while (addr < paddr) {
1404df898dcSSven Schnelle 		if (copy_from_kernel_nofault(&insn, (void *)addr, sizeof(insn)))
1414df898dcSSven Schnelle 			return false;
1424df898dcSSven Schnelle 
1434df898dcSSven Schnelle 		if (insn >> 8 == 0) {
1444df898dcSSven Schnelle 			if (insn != BREAKPOINT_INSTRUCTION) {
1454df898dcSSven Schnelle 				/*
1464df898dcSSven Schnelle 				 * Note that QEMU inserts opcode 0x0000 to implement
1474df898dcSSven Schnelle 				 * software breakpoints for guests. Since the size of
1484df898dcSSven Schnelle 				 * the original instruction is unknown, stop following
1494df898dcSSven Schnelle 				 * instructions and prevent setting a kprobe.
1504df898dcSSven Schnelle 				 */
1514df898dcSSven Schnelle 				return false;
1524df898dcSSven Schnelle 			}
1534df898dcSSven Schnelle 			/*
1544df898dcSSven Schnelle 			 * Check if the instruction has been modified by another
1554df898dcSSven Schnelle 			 * kprobe, in which case the original instruction is
1564df898dcSSven Schnelle 			 * decoded.
1574df898dcSSven Schnelle 			 */
1584df898dcSSven Schnelle 			kp = get_kprobe((void *)addr);
1594df898dcSSven Schnelle 			if (!kp) {
1604df898dcSSven Schnelle 				/* not a kprobe */
1614df898dcSSven Schnelle 				return false;
1624df898dcSSven Schnelle 			}
1634df898dcSSven Schnelle 			insn = kp->opcode;
1644df898dcSSven Schnelle 		}
1654df898dcSSven Schnelle 		addr += insn_length(insn >> 8);
1664df898dcSSven Schnelle 	}
1674df898dcSSven Schnelle 	return addr == paddr;
1684df898dcSSven Schnelle }
1694df898dcSSven Schnelle 
arch_prepare_kprobe(struct kprobe * p)1707a5388deSHeiko Carstens int arch_prepare_kprobe(struct kprobe *p)
171ba640a59SMartin Schwidefsky {
1724df898dcSSven Schnelle 	if (!can_probe((unsigned long)p->addr))
173ba640a59SMartin Schwidefsky 		return -EINVAL;
174ba640a59SMartin Schwidefsky 	/* Make sure the probe isn't going on a difficult instruction */
175975fab17SJan Willeke 	if (probe_is_prohibited_opcode(p->addr))
176ba640a59SMartin Schwidefsky 		return -EINVAL;
17763c40436SHeiko Carstens 	if (s390_get_insn_slot(p))
17863c40436SHeiko Carstens 		return -ENOMEM;
17963c40436SHeiko Carstens 	copy_instruction(p);
180ba640a59SMartin Schwidefsky 	return 0;
1814ba069b8SMichael Grundy }
1827a5388deSHeiko Carstens NOKPROBE_SYMBOL(arch_prepare_kprobe);
1834ba069b8SMichael Grundy 
184c933146aSHeiko Carstens struct swap_insn_args {
185c933146aSHeiko Carstens 	struct kprobe *p;
186c933146aSHeiko Carstens 	unsigned int arm_kprobe : 1;
1875a8b589fSMartin Schwidefsky };
1885a8b589fSMartin Schwidefsky 
swap_instruction(void * data)1897a5388deSHeiko Carstens static int swap_instruction(void *data)
1904ba069b8SMichael Grundy {
191c933146aSHeiko Carstens 	struct swap_insn_args *args = data;
192c933146aSHeiko Carstens 	struct kprobe *p = args->p;
193657480d9SSven Schnelle 	u16 opc;
1944ba069b8SMichael Grundy 
195657480d9SSven Schnelle 	opc = args->arm_kprobe ? BREAKPOINT_INSTRUCTION : p->opcode;
196657480d9SSven Schnelle 	s390_kernel_write(p->addr, &opc, sizeof(opc));
1975a8b589fSMartin Schwidefsky 	return 0;
1984ba069b8SMichael Grundy }
1997a5388deSHeiko Carstens NOKPROBE_SYMBOL(swap_instruction);
2004ba069b8SMichael Grundy 
arch_arm_kprobe(struct kprobe * p)2017a5388deSHeiko Carstens void arch_arm_kprobe(struct kprobe *p)
2024ba069b8SMichael Grundy {
203c933146aSHeiko Carstens 	struct swap_insn_args args = {.p = p, .arm_kprobe = 1};
2044ba069b8SMichael Grundy 
2055d5dbc4eSThomas Gleixner 	stop_machine_cpuslocked(swap_instruction, &args, NULL);
2064ba069b8SMichael Grundy }
2077a5388deSHeiko Carstens NOKPROBE_SYMBOL(arch_arm_kprobe);
2084ba069b8SMichael Grundy 
arch_disarm_kprobe(struct kprobe * p)2097a5388deSHeiko Carstens void arch_disarm_kprobe(struct kprobe *p)
2104ba069b8SMichael Grundy {
211c933146aSHeiko Carstens 	struct swap_insn_args args = {.p = p, .arm_kprobe = 0};
2124ba069b8SMichael Grundy 
2135d5dbc4eSThomas Gleixner 	stop_machine_cpuslocked(swap_instruction, &args, NULL);
2144ba069b8SMichael Grundy }
2157a5388deSHeiko Carstens NOKPROBE_SYMBOL(arch_disarm_kprobe);
2164ba069b8SMichael Grundy 
arch_remove_kprobe(struct kprobe * p)2177a5388deSHeiko Carstens void arch_remove_kprobe(struct kprobe *p)
2184ba069b8SMichael Grundy {
21963c40436SHeiko Carstens 	s390_free_insn_slot(p);
2204ba069b8SMichael Grundy }
2217a5388deSHeiko Carstens NOKPROBE_SYMBOL(arch_remove_kprobe);
2224ba069b8SMichael Grundy 
enable_singlestep(struct kprobe_ctlblk * kcb,struct pt_regs * regs,unsigned long ip)2237a5388deSHeiko Carstens static void enable_singlestep(struct kprobe_ctlblk *kcb,
224fc0a1feaSMartin Schwidefsky 			      struct pt_regs *regs,
225fc0a1feaSMartin Schwidefsky 			      unsigned long ip)
2264ba069b8SMichael Grundy {
2275e9a2692SMartin Schwidefsky 	struct per_regs per_kprobe;
2284ba069b8SMichael Grundy 
2295e9a2692SMartin Schwidefsky 	/* Set up the PER control registers %cr9-%cr11 */
2305e9a2692SMartin Schwidefsky 	per_kprobe.control = PER_EVENT_IFETCH;
2315e9a2692SMartin Schwidefsky 	per_kprobe.start = ip;
2325e9a2692SMartin Schwidefsky 	per_kprobe.end = ip;
2334ba069b8SMichael Grundy 
234fc0a1feaSMartin Schwidefsky 	/* Save control regs and psw mask */
235fc0a1feaSMartin Schwidefsky 	__ctl_store(kcb->kprobe_saved_ctl, 9, 11);
236fc0a1feaSMartin Schwidefsky 	kcb->kprobe_saved_imask = regs->psw.mask &
237fc0a1feaSMartin Schwidefsky 		(PSW_MASK_PER | PSW_MASK_IO | PSW_MASK_EXT);
238fc0a1feaSMartin Schwidefsky 
239fc0a1feaSMartin Schwidefsky 	/* Set PER control regs, turns on single step for the given address */
2405e9a2692SMartin Schwidefsky 	__ctl_load(per_kprobe, 9, 11);
2414ba069b8SMichael Grundy 	regs->psw.mask |= PSW_MASK_PER;
242adb45839SMartin Schwidefsky 	regs->psw.mask &= ~(PSW_MASK_IO | PSW_MASK_EXT);
243fecc868aSHeiko Carstens 	regs->psw.addr = ip;
2444ba069b8SMichael Grundy }
2457a5388deSHeiko Carstens NOKPROBE_SYMBOL(enable_singlestep);
2464ba069b8SMichael Grundy 
disable_singlestep(struct kprobe_ctlblk * kcb,struct pt_regs * regs,unsigned long ip)2477a5388deSHeiko Carstens static void disable_singlestep(struct kprobe_ctlblk *kcb,
248fc0a1feaSMartin Schwidefsky 			       struct pt_regs *regs,
249fc0a1feaSMartin Schwidefsky 			       unsigned long ip)
250fc0a1feaSMartin Schwidefsky {
251fc0a1feaSMartin Schwidefsky 	/* Restore control regs and psw mask, set new psw address */
252fc0a1feaSMartin Schwidefsky 	__ctl_load(kcb->kprobe_saved_ctl, 9, 11);
253fc0a1feaSMartin Schwidefsky 	regs->psw.mask &= ~PSW_MASK_PER;
254fc0a1feaSMartin Schwidefsky 	regs->psw.mask |= kcb->kprobe_saved_imask;
255fecc868aSHeiko Carstens 	regs->psw.addr = ip;
256fc0a1feaSMartin Schwidefsky }
2577a5388deSHeiko Carstens NOKPROBE_SYMBOL(disable_singlestep);
258fc0a1feaSMartin Schwidefsky 
259b9599798SMartin Schwidefsky /*
260b9599798SMartin Schwidefsky  * Activate a kprobe by storing its pointer to current_kprobe. The
261b9599798SMartin Schwidefsky  * previous kprobe is stored in kcb->prev_kprobe. A stack of up to
262b9599798SMartin Schwidefsky  * two kprobes can be active, see KPROBE_REENTER.
263b9599798SMartin Schwidefsky  */
push_kprobe(struct kprobe_ctlblk * kcb,struct kprobe * p)2647a5388deSHeiko Carstens static void push_kprobe(struct kprobe_ctlblk *kcb, struct kprobe *p)
2654ba069b8SMichael Grundy {
266eb7e7d76SChristoph Lameter 	kcb->prev_kprobe.kp = __this_cpu_read(current_kprobe);
2674ba069b8SMichael Grundy 	kcb->prev_kprobe.status = kcb->kprobe_status;
268eb7e7d76SChristoph Lameter 	__this_cpu_write(current_kprobe, p);
2694ba069b8SMichael Grundy }
2707a5388deSHeiko Carstens NOKPROBE_SYMBOL(push_kprobe);
2714ba069b8SMichael Grundy 
272b9599798SMartin Schwidefsky /*
273b9599798SMartin Schwidefsky  * Deactivate a kprobe by backing up to the previous state. If the
274b9599798SMartin Schwidefsky  * current state is KPROBE_REENTER prev_kprobe.kp will be non-NULL,
275b9599798SMartin Schwidefsky  * for any other state prev_kprobe.kp will be NULL.
276b9599798SMartin Schwidefsky  */
pop_kprobe(struct kprobe_ctlblk * kcb)2777a5388deSHeiko Carstens static void pop_kprobe(struct kprobe_ctlblk *kcb)
2784ba069b8SMichael Grundy {
279eb7e7d76SChristoph Lameter 	__this_cpu_write(current_kprobe, kcb->prev_kprobe.kp);
2804ba069b8SMichael Grundy 	kcb->kprobe_status = kcb->prev_kprobe.status;
281cd579539SVasily Gorbik 	kcb->prev_kprobe.kp = NULL;
2824ba069b8SMichael Grundy }
2837a5388deSHeiko Carstens NOKPROBE_SYMBOL(pop_kprobe);
2844ba069b8SMichael Grundy 
kprobe_reenter_check(struct kprobe_ctlblk * kcb,struct kprobe * p)2857a5388deSHeiko Carstens static void kprobe_reenter_check(struct kprobe_ctlblk *kcb, struct kprobe *p)
2860e917cc3SMartin Schwidefsky {
2870e917cc3SMartin Schwidefsky 	switch (kcb->kprobe_status) {
2880e917cc3SMartin Schwidefsky 	case KPROBE_HIT_SSDONE:
2890e917cc3SMartin Schwidefsky 	case KPROBE_HIT_ACTIVE:
2900e917cc3SMartin Schwidefsky 		kprobes_inc_nmissed_count(p);
2910e917cc3SMartin Schwidefsky 		break;
2920e917cc3SMartin Schwidefsky 	case KPROBE_HIT_SS:
2930e917cc3SMartin Schwidefsky 	case KPROBE_REENTER:
2940e917cc3SMartin Schwidefsky 	default:
2950e917cc3SMartin Schwidefsky 		/*
2960e917cc3SMartin Schwidefsky 		 * A kprobe on the code path to single step an instruction
2970e917cc3SMartin Schwidefsky 		 * is a BUG. The code path resides in the .kprobes.text
2980e917cc3SMartin Schwidefsky 		 * section and is executed with interrupts disabled.
2990e917cc3SMartin Schwidefsky 		 */
3009c89bb8eSMasami Hiramatsu 		pr_err("Failed to recover from reentered kprobes.\n");
3010e917cc3SMartin Schwidefsky 		dump_kprobe(p);
3020e917cc3SMartin Schwidefsky 		BUG();
3030e917cc3SMartin Schwidefsky 	}
3040e917cc3SMartin Schwidefsky }
3057a5388deSHeiko Carstens NOKPROBE_SYMBOL(kprobe_reenter_check);
3060e917cc3SMartin Schwidefsky 
kprobe_handler(struct pt_regs * regs)3077a5388deSHeiko Carstens static int kprobe_handler(struct pt_regs *regs)
3084ba069b8SMichael Grundy {
3094ba069b8SMichael Grundy 	struct kprobe_ctlblk *kcb;
3100e917cc3SMartin Schwidefsky 	struct kprobe *p;
3114ba069b8SMichael Grundy 
3124ba069b8SMichael Grundy 	/*
3130e917cc3SMartin Schwidefsky 	 * We want to disable preemption for the entire duration of kprobe
3140e917cc3SMartin Schwidefsky 	 * processing. That includes the calls to the pre/post handlers
3150e917cc3SMartin Schwidefsky 	 * and single stepping the kprobe instruction.
3164ba069b8SMichael Grundy 	 */
3174ba069b8SMichael Grundy 	preempt_disable();
3184ba069b8SMichael Grundy 	kcb = get_kprobe_ctlblk();
3199cb1ccecSHeiko Carstens 	p = get_kprobe((void *)(regs->psw.addr - 2));
3204ba069b8SMichael Grundy 
3214ba069b8SMichael Grundy 	if (p) {
3220e917cc3SMartin Schwidefsky 		if (kprobe_running()) {
323b9599798SMartin Schwidefsky 			/*
324b9599798SMartin Schwidefsky 			 * We have hit a kprobe while another is still
325b9599798SMartin Schwidefsky 			 * active. This can happen in the pre and post
326b9599798SMartin Schwidefsky 			 * handler. Single step the instruction of the
327b9599798SMartin Schwidefsky 			 * new probe but do not call any handler function
328b9599798SMartin Schwidefsky 			 * of this secondary kprobe.
329b9599798SMartin Schwidefsky 			 * push_kprobe and pop_kprobe saves and restores
330b9599798SMartin Schwidefsky 			 * the currently active kprobe.
3314ba069b8SMichael Grundy 			 */
3320e917cc3SMartin Schwidefsky 			kprobe_reenter_check(kcb, p);
333b9599798SMartin Schwidefsky 			push_kprobe(kcb, p);
3344ba069b8SMichael Grundy 			kcb->kprobe_status = KPROBE_REENTER;
3354ba069b8SMichael Grundy 		} else {
3360e917cc3SMartin Schwidefsky 			/*
3370e917cc3SMartin Schwidefsky 			 * If we have no pre-handler or it returned 0, we
3380e917cc3SMartin Schwidefsky 			 * continue with single stepping. If we have a
3390e917cc3SMartin Schwidefsky 			 * pre-handler and it returned non-zero, it prepped
340fc682f7bSMasami Hiramatsu 			 * for changing execution path, so get out doing
341fc682f7bSMasami Hiramatsu 			 * nothing more here.
3420e917cc3SMartin Schwidefsky 			 */
3430e917cc3SMartin Schwidefsky 			push_kprobe(kcb, p);
3440e917cc3SMartin Schwidefsky 			kcb->kprobe_status = KPROBE_HIT_ACTIVE;
345cce188bdSMasami Hiramatsu 			if (p->pre_handler && p->pre_handler(p, regs)) {
346cce188bdSMasami Hiramatsu 				pop_kprobe(kcb);
347cce188bdSMasami Hiramatsu 				preempt_enable_no_resched();
3480e917cc3SMartin Schwidefsky 				return 1;
349cce188bdSMasami Hiramatsu 			}
3500e917cc3SMartin Schwidefsky 			kcb->kprobe_status = KPROBE_HIT_SS;
3510e917cc3SMartin Schwidefsky 		}
3520e917cc3SMartin Schwidefsky 		enable_singlestep(kcb, regs, (unsigned long) p->ainsn.insn);
3530e917cc3SMartin Schwidefsky 		return 1;
3540e917cc3SMartin Schwidefsky 	} /* else:
3550e917cc3SMartin Schwidefsky 	   * No kprobe at this address and no active kprobe. The trap has
3560e917cc3SMartin Schwidefsky 	   * not been caused by a kprobe breakpoint. The race of breakpoint
3570e917cc3SMartin Schwidefsky 	   * vs. kprobe remove does not exist because on s390 as we use
3580e917cc3SMartin Schwidefsky 	   * stop_machine to arm/disarm the breakpoints.
3590e917cc3SMartin Schwidefsky 	   */
3604ba069b8SMichael Grundy 	preempt_enable_no_resched();
3610e917cc3SMartin Schwidefsky 	return 0;
3624ba069b8SMichael Grundy }
3637a5388deSHeiko Carstens NOKPROBE_SYMBOL(kprobe_handler);
3644ba069b8SMichael Grundy 
3654ba069b8SMichael Grundy /*
3664ba069b8SMichael Grundy  * Called after single-stepping.  p->addr is the address of the
3674ba069b8SMichael Grundy  * instruction whose first byte has been replaced by the "breakpoint"
3684ba069b8SMichael Grundy  * instruction.  To avoid the SMP problems that can occur when we
3694ba069b8SMichael Grundy  * temporarily put back the original opcode to single-step, we
3704ba069b8SMichael Grundy  * single-stepped a copy of the instruction.  The address of this
3714ba069b8SMichael Grundy  * copy is p->ainsn.insn.
3724ba069b8SMichael Grundy  */
resume_execution(struct kprobe * p,struct pt_regs * regs)3737a5388deSHeiko Carstens static void resume_execution(struct kprobe *p, struct pt_regs *regs)
3744ba069b8SMichael Grundy {
3754ba069b8SMichael Grundy 	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
3769cb1ccecSHeiko Carstens 	unsigned long ip = regs->psw.addr;
377975fab17SJan Willeke 	int fixup = probe_get_fixup_type(p->ainsn.insn);
3784ba069b8SMichael Grundy 
379ba640a59SMartin Schwidefsky 	if (fixup & FIXUP_PSW_NORMAL)
380fc0a1feaSMartin Schwidefsky 		ip += (unsigned long) p->addr - (unsigned long) p->ainsn.insn;
3814ba069b8SMichael Grundy 
382ba640a59SMartin Schwidefsky 	if (fixup & FIXUP_BRANCH_NOT_TAKEN) {
383a882b3b0SHeiko Carstens 		int ilen = insn_length(p->ainsn.insn[0] >> 8);
384ba640a59SMartin Schwidefsky 		if (ip - (unsigned long) p->ainsn.insn == ilen)
385ba640a59SMartin Schwidefsky 			ip = (unsigned long) p->addr + ilen;
386ba640a59SMartin Schwidefsky 	}
3874ba069b8SMichael Grundy 
388ba640a59SMartin Schwidefsky 	if (fixup & FIXUP_RETURN_REGISTER) {
389ba640a59SMartin Schwidefsky 		int reg = (p->ainsn.insn[0] & 0xf0) >> 4;
390ba640a59SMartin Schwidefsky 		regs->gprs[reg] += (unsigned long) p->addr -
391fc0a1feaSMartin Schwidefsky 				   (unsigned long) p->ainsn.insn;
392ba640a59SMartin Schwidefsky 	}
3934ba069b8SMichael Grundy 
394fc0a1feaSMartin Schwidefsky 	disable_singlestep(kcb, regs, ip);
3954ba069b8SMichael Grundy }
3967a5388deSHeiko Carstens NOKPROBE_SYMBOL(resume_execution);
3974ba069b8SMichael Grundy 
post_kprobe_handler(struct pt_regs * regs)3987a5388deSHeiko Carstens static int post_kprobe_handler(struct pt_regs *regs)
3994ba069b8SMichael Grundy {
4004ba069b8SMichael Grundy 	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
4014a188635SMartin Schwidefsky 	struct kprobe *p = kprobe_running();
4024ba069b8SMichael Grundy 
4034a188635SMartin Schwidefsky 	if (!p)
4044ba069b8SMichael Grundy 		return 0;
4054ba069b8SMichael Grundy 
40642e19e6fSVasily Gorbik 	resume_execution(p, regs);
4074a188635SMartin Schwidefsky 	if (kcb->kprobe_status != KPROBE_REENTER && p->post_handler) {
4084ba069b8SMichael Grundy 		kcb->kprobe_status = KPROBE_HIT_SSDONE;
4094a188635SMartin Schwidefsky 		p->post_handler(p, regs, 0);
4104ba069b8SMichael Grundy 	}
411b9599798SMartin Schwidefsky 	pop_kprobe(kcb);
4124ba069b8SMichael Grundy 	preempt_enable_no_resched();
4134ba069b8SMichael Grundy 
4144ba069b8SMichael Grundy 	/*
4154ba069b8SMichael Grundy 	 * if somebody else is singlestepping across a probe point, psw mask
4164ba069b8SMichael Grundy 	 * will have PER set, in which case, continue the remaining processing
4174ba069b8SMichael Grundy 	 * of do_single_step, as if this is not a probe hit.
4184ba069b8SMichael Grundy 	 */
4194a188635SMartin Schwidefsky 	if (regs->psw.mask & PSW_MASK_PER)
4204ba069b8SMichael Grundy 		return 0;
4214ba069b8SMichael Grundy 
4224ba069b8SMichael Grundy 	return 1;
4234ba069b8SMichael Grundy }
4247a5388deSHeiko Carstens NOKPROBE_SYMBOL(post_kprobe_handler);
4254ba069b8SMichael Grundy 
kprobe_trap_handler(struct pt_regs * regs,int trapnr)4267a5388deSHeiko Carstens static int kprobe_trap_handler(struct pt_regs *regs, int trapnr)
4274ba069b8SMichael Grundy {
4284ba069b8SMichael Grundy 	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
4294a188635SMartin Schwidefsky 	struct kprobe *p = kprobe_running();
4304ba069b8SMichael Grundy 
4314ba069b8SMichael Grundy 	switch(kcb->kprobe_status) {
4324ba069b8SMichael Grundy 	case KPROBE_HIT_SS:
4334ba069b8SMichael Grundy 	case KPROBE_REENTER:
4344ba069b8SMichael Grundy 		/*
4354ba069b8SMichael Grundy 		 * We are here because the instruction being single
4364ba069b8SMichael Grundy 		 * stepped caused a page fault. We reset the current
4374ba069b8SMichael Grundy 		 * kprobe and the nip points back to the probe address
4384ba069b8SMichael Grundy 		 * and allow the page fault handler to continue as a
4394ba069b8SMichael Grundy 		 * normal page fault.
4404ba069b8SMichael Grundy 		 */
4414a188635SMartin Schwidefsky 		disable_singlestep(kcb, regs, (unsigned long) p->addr);
442b9599798SMartin Schwidefsky 		pop_kprobe(kcb);
4434ba069b8SMichael Grundy 		preempt_enable_no_resched();
4444ba069b8SMichael Grundy 		break;
4454ba069b8SMichael Grundy 	case KPROBE_HIT_ACTIVE:
4464ba069b8SMichael Grundy 	case KPROBE_HIT_SSDONE:
4474ba069b8SMichael Grundy 		/*
4484ba069b8SMichael Grundy 		 * In case the user-specified fault handler returned
4494ba069b8SMichael Grundy 		 * zero, try to fix up.
4504ba069b8SMichael Grundy 		 */
45146fee16fSHeiko Carstens 		if (fixup_exception(regs))
4524ba069b8SMichael Grundy 			return 1;
4534ba069b8SMichael Grundy 		/*
4544ba069b8SMichael Grundy 		 * fixup_exception() could not handle it,
4554ba069b8SMichael Grundy 		 * Let do_page_fault() fix it.
4564ba069b8SMichael Grundy 		 */
4574ba069b8SMichael Grundy 		break;
4584ba069b8SMichael Grundy 	default:
4594ba069b8SMichael Grundy 		break;
4604ba069b8SMichael Grundy 	}
4614ba069b8SMichael Grundy 	return 0;
4624ba069b8SMichael Grundy }
4637a5388deSHeiko Carstens NOKPROBE_SYMBOL(kprobe_trap_handler);
4644ba069b8SMichael Grundy 
kprobe_fault_handler(struct pt_regs * regs,int trapnr)4657a5388deSHeiko Carstens int kprobe_fault_handler(struct pt_regs *regs, int trapnr)
466adb45839SMartin Schwidefsky {
467adb45839SMartin Schwidefsky 	int ret;
468adb45839SMartin Schwidefsky 
469adb45839SMartin Schwidefsky 	if (regs->psw.mask & (PSW_MASK_IO | PSW_MASK_EXT))
470adb45839SMartin Schwidefsky 		local_irq_disable();
471adb45839SMartin Schwidefsky 	ret = kprobe_trap_handler(regs, trapnr);
472adb45839SMartin Schwidefsky 	if (regs->psw.mask & (PSW_MASK_IO | PSW_MASK_EXT))
473adb45839SMartin Schwidefsky 		local_irq_restore(regs->psw.mask & ~PSW_MASK_PER);
474adb45839SMartin Schwidefsky 	return ret;
475adb45839SMartin Schwidefsky }
4767a5388deSHeiko Carstens NOKPROBE_SYMBOL(kprobe_fault_handler);
477adb45839SMartin Schwidefsky 
4784ba069b8SMichael Grundy /*
4794ba069b8SMichael Grundy  * Wrapper routine to for handling exceptions.
4804ba069b8SMichael Grundy  */
kprobe_exceptions_notify(struct notifier_block * self,unsigned long val,void * data)4817a5388deSHeiko Carstens int kprobe_exceptions_notify(struct notifier_block *self,
4824ba069b8SMichael Grundy 			     unsigned long val, void *data)
4834ba069b8SMichael Grundy {
4844ba069b8SMichael Grundy 	struct die_args *args = (struct die_args *) data;
485adb45839SMartin Schwidefsky 	struct pt_regs *regs = args->regs;
4864ba069b8SMichael Grundy 	int ret = NOTIFY_DONE;
4874ba069b8SMichael Grundy 
488adb45839SMartin Schwidefsky 	if (regs->psw.mask & (PSW_MASK_IO | PSW_MASK_EXT))
489adb45839SMartin Schwidefsky 		local_irq_disable();
490adb45839SMartin Schwidefsky 
4914ba069b8SMichael Grundy 	switch (val) {
4924ba069b8SMichael Grundy 	case DIE_BPT:
4934a188635SMartin Schwidefsky 		if (kprobe_handler(regs))
4944ba069b8SMichael Grundy 			ret = NOTIFY_STOP;
4954ba069b8SMichael Grundy 		break;
4964ba069b8SMichael Grundy 	case DIE_SSTEP:
4974a188635SMartin Schwidefsky 		if (post_kprobe_handler(regs))
4984ba069b8SMichael Grundy 			ret = NOTIFY_STOP;
4994ba069b8SMichael Grundy 		break;
5004ba069b8SMichael Grundy 	case DIE_TRAP:
501adb45839SMartin Schwidefsky 		if (!preemptible() && kprobe_running() &&
5024a188635SMartin Schwidefsky 		    kprobe_trap_handler(regs, args->trapnr))
5034ba069b8SMichael Grundy 			ret = NOTIFY_STOP;
5044ba069b8SMichael Grundy 		break;
5054ba069b8SMichael Grundy 	default:
5064ba069b8SMichael Grundy 		break;
5074ba069b8SMichael Grundy 	}
508adb45839SMartin Schwidefsky 
509adb45839SMartin Schwidefsky 	if (regs->psw.mask & (PSW_MASK_IO | PSW_MASK_EXT))
510adb45839SMartin Schwidefsky 		local_irq_restore(regs->psw.mask & ~PSW_MASK_PER);
511adb45839SMartin Schwidefsky 
5124ba069b8SMichael Grundy 	return ret;
5134ba069b8SMichael Grundy }
5147a5388deSHeiko Carstens NOKPROBE_SYMBOL(kprobe_exceptions_notify);
5154ba069b8SMichael Grundy 
arch_init_kprobes(void)5164ba069b8SMichael Grundy int __init arch_init_kprobes(void)
5174ba069b8SMichael Grundy {
51863bf38ffSTobias Huschle 	return 0;
5194ba069b8SMichael Grundy }
520bf8f6e5bSAnanth N Mavinakayanahalli 
arch_trampoline_kprobe(struct kprobe * p)5217a5388deSHeiko Carstens int arch_trampoline_kprobe(struct kprobe *p)
522bf8f6e5bSAnanth N Mavinakayanahalli {
52363bf38ffSTobias Huschle 	return 0;
524bf8f6e5bSAnanth N Mavinakayanahalli }
5257a5388deSHeiko Carstens NOKPROBE_SYMBOL(arch_trampoline_kprobe);
526