/* * Function return trampoline: * - init_kprobes() establishes a probepoint here * - When the probed function returns, this probe * causes the handlers to fire
*/ asm(".global arch_rethook_trampoline\n" ".type arch_rethook_trampoline, @function\n" "arch_rethook_trampoline:\n" "nop\n" "blr\n" ".size arch_rethook_trampoline, .-arch_rethook_trampoline\n");
/* * Called when the probe at kretprobe trampoline is hit
*/ staticint trampoline_rethook_handler(struct kprobe *p, struct pt_regs *regs)
{ return !rethook_trampoline_handler(regs, regs->gpr[1]);
}
NOKPROBE_SYMBOL(trampoline_rethook_handler);
/* Replace the return addr with trampoline addr */
regs->link = (unsignedlong)arch_rethook_trampoline;
}
NOKPROBE_SYMBOL(arch_rethook_prepare);
/* This is called from rethook_trampoline_handler(). */ void arch_rethook_fixup_return(struct pt_regs *regs, unsignedlong orig_ret_address)
{ /* * We get here through one of two paths: * 1. by taking a trap -> kprobe_handler() -> here * 2. by optprobe branch -> optimized_callback() -> opt_pre_handler() -> here * * When going back through (1), we need regs->nip to be setup properly * as it is used to determine the return address from the trap. * For (2), since nip is not honoured with optprobes, we instead setup * the link register properly so that the subsequent 'blr' in * arch_rethook_trampoline jumps back to the right instruction. * * For nip, we should set the address to the previous instruction since * we end up emulating it in kprobe_handler(), which increments the nip * again.
*/
regs_set_return_ip(regs, orig_ret_address - 4);
regs->link = orig_ret_address;
}
NOKPROBE_SYMBOL(arch_rethook_fixup_return);
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.