xref: /linux/include/linux/kprobes.h (revision 64f562c6df3cfc5d1b2b4bdbcb7951457df9c237)
11da177e4SLinus Torvalds #ifndef _LINUX_KPROBES_H
21da177e4SLinus Torvalds #define _LINUX_KPROBES_H
31da177e4SLinus Torvalds /*
41da177e4SLinus Torvalds  *  Kernel Probes (KProbes)
51da177e4SLinus Torvalds  *  include/linux/kprobes.h
61da177e4SLinus Torvalds  *
71da177e4SLinus Torvalds  * This program is free software; you can redistribute it and/or modify
81da177e4SLinus Torvalds  * it under the terms of the GNU General Public License as published by
91da177e4SLinus Torvalds  * the Free Software Foundation; either version 2 of the License, or
101da177e4SLinus Torvalds  * (at your option) any later version.
111da177e4SLinus Torvalds  *
121da177e4SLinus Torvalds  * This program is distributed in the hope that it will be useful,
131da177e4SLinus Torvalds  * but WITHOUT ANY WARRANTY; without even the implied warranty of
141da177e4SLinus Torvalds  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
151da177e4SLinus Torvalds  * GNU General Public License for more details.
161da177e4SLinus Torvalds  *
171da177e4SLinus Torvalds  * You should have received a copy of the GNU General Public License
181da177e4SLinus Torvalds  * along with this program; if not, write to the Free Software
191da177e4SLinus Torvalds  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
201da177e4SLinus Torvalds  *
211da177e4SLinus Torvalds  * Copyright (C) IBM Corporation, 2002, 2004
221da177e4SLinus Torvalds  *
231da177e4SLinus Torvalds  * 2002-Oct	Created by Vamsi Krishna S <vamsi_krishna@in.ibm.com> Kernel
241da177e4SLinus Torvalds  *		Probes initial implementation ( includes suggestions from
251da177e4SLinus Torvalds  *		Rusty Russell).
261da177e4SLinus Torvalds  * 2004-July	Suparna Bhattacharya <suparna@in.ibm.com> added jumper probes
271da177e4SLinus Torvalds  *		interface to access function arguments.
281da177e4SLinus Torvalds  */
291da177e4SLinus Torvalds #include <linux/config.h>
301da177e4SLinus Torvalds #include <linux/list.h>
311da177e4SLinus Torvalds #include <linux/notifier.h>
321da177e4SLinus Torvalds #include <linux/smp.h>
331da177e4SLinus Torvalds #include <asm/kprobes.h>
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds struct kprobe;
361da177e4SLinus Torvalds struct pt_regs;
371da177e4SLinus Torvalds typedef int (*kprobe_pre_handler_t) (struct kprobe *, struct pt_regs *);
381da177e4SLinus Torvalds typedef int (*kprobe_break_handler_t) (struct kprobe *, struct pt_regs *);
391da177e4SLinus Torvalds typedef void (*kprobe_post_handler_t) (struct kprobe *, struct pt_regs *,
401da177e4SLinus Torvalds 				       unsigned long flags);
411da177e4SLinus Torvalds typedef int (*kprobe_fault_handler_t) (struct kprobe *, struct pt_regs *,
421da177e4SLinus Torvalds 				       int trapnr);
431da177e4SLinus Torvalds struct kprobe {
441da177e4SLinus Torvalds 	struct hlist_node hlist;
451da177e4SLinus Torvalds 
46*64f562c6SAnanth N Mavinakayanahalli 	/* list of kprobes for multi-handler support */
47*64f562c6SAnanth N Mavinakayanahalli 	struct list_head list;
48*64f562c6SAnanth N Mavinakayanahalli 
491da177e4SLinus Torvalds 	/* location of the probe point */
501da177e4SLinus Torvalds 	kprobe_opcode_t *addr;
511da177e4SLinus Torvalds 
521da177e4SLinus Torvalds 	/* Called before addr is executed. */
531da177e4SLinus Torvalds 	kprobe_pre_handler_t pre_handler;
541da177e4SLinus Torvalds 
551da177e4SLinus Torvalds 	/* Called after addr is executed, unless... */
561da177e4SLinus Torvalds 	kprobe_post_handler_t post_handler;
571da177e4SLinus Torvalds 
581da177e4SLinus Torvalds 	/* ... called if executing addr causes a fault (eg. page fault).
591da177e4SLinus Torvalds 	 * Return 1 if it handled fault, otherwise kernel will see it. */
601da177e4SLinus Torvalds 	kprobe_fault_handler_t fault_handler;
611da177e4SLinus Torvalds 
621da177e4SLinus Torvalds 	/* ... called if breakpoint trap occurs in probe handler.
631da177e4SLinus Torvalds 	 * Return 1 if it handled break, otherwise kernel will see it. */
641da177e4SLinus Torvalds 	kprobe_break_handler_t break_handler;
651da177e4SLinus Torvalds 
661da177e4SLinus Torvalds 	/* Saved opcode (which has been replaced with breakpoint) */
671da177e4SLinus Torvalds 	kprobe_opcode_t opcode;
681da177e4SLinus Torvalds 
691da177e4SLinus Torvalds 	/* copy of the original instruction */
701da177e4SLinus Torvalds 	struct arch_specific_insn ainsn;
711da177e4SLinus Torvalds };
721da177e4SLinus Torvalds 
731da177e4SLinus Torvalds /*
741da177e4SLinus Torvalds  * Special probe type that uses setjmp-longjmp type tricks to resume
751da177e4SLinus Torvalds  * execution at a specified entry with a matching prototype corresponding
761da177e4SLinus Torvalds  * to the probed function - a trick to enable arguments to become
771da177e4SLinus Torvalds  * accessible seamlessly by probe handling logic.
781da177e4SLinus Torvalds  * Note:
791da177e4SLinus Torvalds  * Because of the way compilers allocate stack space for local variables
801da177e4SLinus Torvalds  * etc upfront, regardless of sub-scopes within a function, this mirroring
811da177e4SLinus Torvalds  * principle currently works only for probes placed on function entry points.
821da177e4SLinus Torvalds  */
831da177e4SLinus Torvalds struct jprobe {
841da177e4SLinus Torvalds 	struct kprobe kp;
851da177e4SLinus Torvalds 	kprobe_opcode_t *entry;	/* probe handling code to jump to */
861da177e4SLinus Torvalds };
871da177e4SLinus Torvalds 
881da177e4SLinus Torvalds #ifdef CONFIG_KPROBES
891da177e4SLinus Torvalds /* Locks kprobe: irq must be disabled */
901da177e4SLinus Torvalds void lock_kprobes(void);
911da177e4SLinus Torvalds void unlock_kprobes(void);
921da177e4SLinus Torvalds 
931da177e4SLinus Torvalds /* kprobe running now on this CPU? */
941da177e4SLinus Torvalds static inline int kprobe_running(void)
951da177e4SLinus Torvalds {
961da177e4SLinus Torvalds 	extern unsigned int kprobe_cpu;
971da177e4SLinus Torvalds 	return kprobe_cpu == smp_processor_id();
981da177e4SLinus Torvalds }
991da177e4SLinus Torvalds 
1001da177e4SLinus Torvalds extern int arch_prepare_kprobe(struct kprobe *p);
1011da177e4SLinus Torvalds extern void arch_copy_kprobe(struct kprobe *p);
1021da177e4SLinus Torvalds extern void arch_remove_kprobe(struct kprobe *p);
1031da177e4SLinus Torvalds extern void show_registers(struct pt_regs *regs);
1041da177e4SLinus Torvalds 
1051da177e4SLinus Torvalds /* Get the kprobe at this addr (if any).  Must have called lock_kprobes */
1061da177e4SLinus Torvalds struct kprobe *get_kprobe(void *addr);
1071da177e4SLinus Torvalds 
1081da177e4SLinus Torvalds int register_kprobe(struct kprobe *p);
1091da177e4SLinus Torvalds void unregister_kprobe(struct kprobe *p);
1101da177e4SLinus Torvalds int setjmp_pre_handler(struct kprobe *, struct pt_regs *);
1111da177e4SLinus Torvalds int longjmp_break_handler(struct kprobe *, struct pt_regs *);
1121da177e4SLinus Torvalds int register_jprobe(struct jprobe *p);
1131da177e4SLinus Torvalds void unregister_jprobe(struct jprobe *p);
1141da177e4SLinus Torvalds void jprobe_return(void);
1151da177e4SLinus Torvalds 
1161da177e4SLinus Torvalds #else
1171da177e4SLinus Torvalds static inline int kprobe_running(void)
1181da177e4SLinus Torvalds {
1191da177e4SLinus Torvalds 	return 0;
1201da177e4SLinus Torvalds }
1211da177e4SLinus Torvalds static inline int register_kprobe(struct kprobe *p)
1221da177e4SLinus Torvalds {
1231da177e4SLinus Torvalds 	return -ENOSYS;
1241da177e4SLinus Torvalds }
1251da177e4SLinus Torvalds static inline void unregister_kprobe(struct kprobe *p)
1261da177e4SLinus Torvalds {
1271da177e4SLinus Torvalds }
1281da177e4SLinus Torvalds static inline int register_jprobe(struct jprobe *p)
1291da177e4SLinus Torvalds {
1301da177e4SLinus Torvalds 	return -ENOSYS;
1311da177e4SLinus Torvalds }
1321da177e4SLinus Torvalds static inline void unregister_jprobe(struct jprobe *p)
1331da177e4SLinus Torvalds {
1341da177e4SLinus Torvalds }
1351da177e4SLinus Torvalds static inline void jprobe_return(void)
1361da177e4SLinus Torvalds {
1371da177e4SLinus Torvalds }
1381da177e4SLinus Torvalds #endif
1391da177e4SLinus Torvalds #endif				/* _LINUX_KPROBES_H */
140