root/arch/csky/kernel/probes/uprobes.c
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Copyright (C) 2014-2016 Pratyush Anand <panand@redhat.com>
 */
#include <linux/highmem.h>
#include <linux/ptrace.h>
#include <linux/uprobes.h>
#include <asm/cacheflush.h>

#include "decode-insn.h"

#define UPROBE_TRAP_NR  UINT_MAX

bool is_swbp_insn(uprobe_opcode_t *insn)
{
        return (*insn & 0xffff) == UPROBE_SWBP_INSN;
}

unsigned long uprobe_get_swbp_addr(struct pt_regs *regs)
{
        return instruction_pointer(regs);
}

int arch_uprobe_analyze_insn(struct arch_uprobe *auprobe, struct mm_struct *mm,
                unsigned long addr)
{
        probe_opcode_t insn;

        insn = *(probe_opcode_t *)(&auprobe->insn[0]);

        auprobe->insn_size = is_insn32(insn) ? 4 : 2;

        switch (csky_probe_decode_insn(&insn, &auprobe->api)) {
        case INSN_REJECTED:
                return -EINVAL;

        case INSN_GOOD_NO_SLOT:
                auprobe->simulate = true;
                break;

        default:
                break;
        }

        return 0;
}

int arch_uprobe_pre_xol(struct arch_uprobe *auprobe, struct pt_regs *regs)
{
        struct uprobe_task *utask = current->utask;

        utask->autask.saved_trap_no = current->thread.trap_no;
        current->thread.trap_no = UPROBE_TRAP_NR;

        instruction_pointer_set(regs, utask->xol_vaddr);

        user_enable_single_step(current);

        return 0;
}

int arch_uprobe_post_xol(struct arch_uprobe *auprobe, struct pt_regs *regs)
{
        struct uprobe_task *utask = current->utask;

        WARN_ON_ONCE(current->thread.trap_no != UPROBE_TRAP_NR);
        current->thread.trap_no = utask->autask.saved_trap_no;

        instruction_pointer_set(regs, utask->vaddr + auprobe->insn_size);

        user_disable_single_step(current);

        return 0;
}

bool arch_uprobe_xol_was_trapped(struct task_struct *t)
{
        if (t->thread.trap_no != UPROBE_TRAP_NR)
                return true;

        return false;
}

bool arch_uprobe_skip_sstep(struct arch_uprobe *auprobe, struct pt_regs *regs)
{
        probe_opcode_t insn;
        unsigned long addr;

        if (!auprobe->simulate)
                return false;

        insn = *(probe_opcode_t *)(&auprobe->insn[0]);
        addr = instruction_pointer(regs);

        if (auprobe->api.handler)
                auprobe->api.handler(insn, addr, regs);

        return true;
}

void arch_uprobe_abort_xol(struct arch_uprobe *auprobe, struct pt_regs *regs)
{
        struct uprobe_task *utask = current->utask;

        current->thread.trap_no = utask->autask.saved_trap_no;

        /*
         * Task has received a fatal signal, so reset back to probed
         * address.
         */
        instruction_pointer_set(regs, utask->vaddr);

        user_disable_single_step(current);
}

bool arch_uretprobe_is_alive(struct return_instance *ret, enum rp_check ctx,
                struct pt_regs *regs)
{
        if (ctx == RP_CHECK_CHAIN_CALL)
                return regs->usp <= ret->stack;
        else
                return regs->usp < ret->stack;
}

unsigned long
arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr,
                                  struct pt_regs *regs)
{
        unsigned long ra;

        ra = regs->lr;

        regs->lr = trampoline_vaddr;

        return ra;
}

int arch_uprobe_exception_notify(struct notifier_block *self,
                                 unsigned long val, void *data)
{
        return NOTIFY_DONE;
}

int uprobe_breakpoint_handler(struct pt_regs *regs)
{
        if (uprobe_pre_sstep_notifier(regs))
                return 1;

        return 0;
}

int uprobe_single_step_handler(struct pt_regs *regs)
{
        if (uprobe_post_sstep_notifier(regs))
                return 1;

        return 0;
}