aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86_64/kernel
diff options
context:
space:
mode:
authorRusty Lynch <rusty.lynch@intel.com>2005-06-23 03:09:25 -0400
committerLinus Torvalds <torvalds@ppc970.osdl.org>2005-06-23 12:45:21 -0400
commit7e1048b11c5afe79aac46a42e3ccec86b8365c6d (patch)
tree4f9caee0153e688f22d7e7b6fdc62e35be4fc3fe /arch/x86_64/kernel
parent73649dab0fd524cb8545a8cb83c6eaf77b107105 (diff)
[PATCH] Move kprobe [dis]arming into arch specific code
The architecture independent code of the current kprobes implementation is arming and disarming kprobes at registration time. The problem is that the code is assuming that arming and disarming is a just done by a simple write of some magic value to an address. This is problematic for ia64 where our instructions look more like structures, and we can not insert break points by just doing something like: *p->addr = BREAKPOINT_INSTRUCTION; The following patch to 2.6.12-rc4-mm2 adds two new architecture dependent functions: * void arch_arm_kprobe(struct kprobe *p) * void arch_disarm_kprobe(struct kprobe *p) and then adds the new functions for each of the architectures that already implement kprobes (spar64/ppc64/i386/x86_64). I thought arch_[dis]arm_kprobe was the most descriptive of what was really happening, but each of the architectures already had a disarm_kprobe() function that was really a "disarm and do some other clean-up items as needed when you stumble across a recursive kprobe." So... I took the liberty of changing the code that was calling disarm_kprobe() to call arch_disarm_kprobe(), and then do the cleanup in the block of code dealing with the recursive kprobe case. So far this patch as been tested on i386, x86_64, and ppc64, but still needs to be tested in sparc64. Signed-off-by: Rusty Lynch <rusty.lynch@intel.com> Signed-off-by: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'arch/x86_64/kernel')
-rw-r--r--arch/x86_64/kernel/kprobes.c26
1 files changed, 18 insertions, 8 deletions
diff --git a/arch/x86_64/kernel/kprobes.c b/arch/x86_64/kernel/kprobes.c
index 203672ca7401..324bf57925a9 100644
--- a/arch/x86_64/kernel/kprobes.c
+++ b/arch/x86_64/kernel/kprobes.c
@@ -39,7 +39,7 @@
39#include <linux/slab.h> 39#include <linux/slab.h>
40#include <linux/preempt.h> 40#include <linux/preempt.h>
41#include <linux/moduleloader.h> 41#include <linux/moduleloader.h>
42 42#include <asm/cacheflush.h>
43#include <asm/pgtable.h> 43#include <asm/pgtable.h>
44#include <asm/kdebug.h> 44#include <asm/kdebug.h>
45 45
@@ -216,19 +216,28 @@ void arch_copy_kprobe(struct kprobe *p)
216 BUG_ON((s64) (s32) disp != disp); /* Sanity check. */ 216 BUG_ON((s64) (s32) disp != disp); /* Sanity check. */
217 *ripdisp = disp; 217 *ripdisp = disp;
218 } 218 }
219 p->opcode = *p->addr;
219} 220}
220 221
221void arch_remove_kprobe(struct kprobe *p) 222void arch_arm_kprobe(struct kprobe *p)
222{ 223{
223 up(&kprobe_mutex); 224 *p->addr = BREAKPOINT_INSTRUCTION;
224 free_insn_slot(p->ainsn.insn); 225 flush_icache_range((unsigned long) p->addr,
225 down(&kprobe_mutex); 226 (unsigned long) p->addr + sizeof(kprobe_opcode_t));
226} 227}
227 228
228static inline void disarm_kprobe(struct kprobe *p, struct pt_regs *regs) 229void arch_disarm_kprobe(struct kprobe *p)
229{ 230{
230 *p->addr = p->opcode; 231 *p->addr = p->opcode;
231 regs->rip = (unsigned long)p->addr; 232 flush_icache_range((unsigned long) p->addr,
233 (unsigned long) p->addr + sizeof(kprobe_opcode_t));
234}
235
236void arch_remove_kprobe(struct kprobe *p)
237{
238 up(&kprobe_mutex);
239 free_insn_slot(p->ainsn.insn);
240 down(&kprobe_mutex);
232} 241}
233 242
234static void prepare_singlestep(struct kprobe *p, struct pt_regs *regs) 243static void prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
@@ -311,7 +320,8 @@ int kprobe_handler(struct pt_regs *regs)
311 unlock_kprobes(); 320 unlock_kprobes();
312 goto no_kprobe; 321 goto no_kprobe;
313 } 322 }
314 disarm_kprobe(p, regs); 323 arch_disarm_kprobe(p);
324 regs->rip = (unsigned long)p->addr;
315 ret = 1; 325 ret = 1;
316 } else { 326 } else {
317 p = current_kprobe; 327 p = current_kprobe;