x86: disable BTS ptrace extensions for now
[wrt350n-kernel.git] / kernel / test_kprobes.c
blob06b6395b45b25dcde1a2dd3e1075bce406742ba4
1 /*
2 * test_kprobes.c - simple sanity test for *probes
4 * Copyright IBM Corp. 2008
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it would be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
14 * the GNU General Public License for more details.
17 #include <linux/kernel.h>
18 #include <linux/kprobes.h>
19 #include <linux/random.h>
21 #define div_factor 3
23 static u32 rand1, preh_val, posth_val, jph_val;
24 static int errors, handler_errors, num_tests;
26 static noinline u32 kprobe_target(u32 value)
29 * gcc ignores noinline on some architectures unless we stuff
30 * sufficient lard into the function. The get_kprobe() here is
31 * just for that.
33 * NOTE: We aren't concerned about the correctness of get_kprobe()
34 * here; hence, this call is neither under !preempt nor with the
35 * kprobe_mutex held. This is fine(tm)
37 if (get_kprobe((void *)0xdeadbeef))
38 printk(KERN_INFO "Kprobe smoke test: probe on 0xdeadbeef!\n");
40 return (value / div_factor);
43 static int kp_pre_handler(struct kprobe *p, struct pt_regs *regs)
45 preh_val = (rand1 / div_factor);
46 return 0;
49 static void kp_post_handler(struct kprobe *p, struct pt_regs *regs,
50 unsigned long flags)
52 if (preh_val != (rand1 / div_factor)) {
53 handler_errors++;
54 printk(KERN_ERR "Kprobe smoke test failed: "
55 "incorrect value in post_handler\n");
57 posth_val = preh_val + div_factor;
60 static struct kprobe kp = {
61 .symbol_name = "kprobe_target",
62 .pre_handler = kp_pre_handler,
63 .post_handler = kp_post_handler
66 static int test_kprobe(void)
68 int ret;
70 ret = register_kprobe(&kp);
71 if (ret < 0) {
72 printk(KERN_ERR "Kprobe smoke test failed: "
73 "register_kprobe returned %d\n", ret);
74 return ret;
77 ret = kprobe_target(rand1);
78 unregister_kprobe(&kp);
80 if (preh_val == 0) {
81 printk(KERN_ERR "Kprobe smoke test failed: "
82 "kprobe pre_handler not called\n");
83 handler_errors++;
86 if (posth_val == 0) {
87 printk(KERN_ERR "Kprobe smoke test failed: "
88 "kprobe post_handler not called\n");
89 handler_errors++;
92 return 0;
95 static u32 j_kprobe_target(u32 value)
97 if (value != rand1) {
98 handler_errors++;
99 printk(KERN_ERR "Kprobe smoke test failed: "
100 "incorrect value in jprobe handler\n");
103 jph_val = rand1;
104 jprobe_return();
105 return 0;
108 static struct jprobe jp = {
109 .entry = j_kprobe_target,
110 .kp.symbol_name = "kprobe_target"
113 static int test_jprobe(void)
115 int ret;
117 ret = register_jprobe(&jp);
118 if (ret < 0) {
119 printk(KERN_ERR "Kprobe smoke test failed: "
120 "register_jprobe returned %d\n", ret);
121 return ret;
124 ret = kprobe_target(rand1);
125 unregister_jprobe(&jp);
126 if (jph_val == 0) {
127 printk(KERN_ERR "Kprobe smoke test failed: "
128 "jprobe handler not called\n");
129 handler_errors++;
132 return 0;
135 #ifdef CONFIG_KRETPROBES
136 static u32 krph_val;
138 static int entry_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
140 krph_val = (rand1 / div_factor);
141 return 0;
144 static int return_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
146 unsigned long ret = regs_return_value(regs);
148 if (ret != (rand1 / div_factor)) {
149 handler_errors++;
150 printk(KERN_ERR "Kprobe smoke test failed: "
151 "incorrect value in kretprobe handler\n");
153 if (krph_val == 0) {
154 handler_errors++;
155 printk(KERN_ERR "Kprobe smoke test failed: "
156 "call to kretprobe entry handler failed\n");
159 krph_val = rand1;
160 return 0;
163 static struct kretprobe rp = {
164 .handler = return_handler,
165 .entry_handler = entry_handler,
166 .kp.symbol_name = "kprobe_target"
169 static int test_kretprobe(void)
171 int ret;
173 ret = register_kretprobe(&rp);
174 if (ret < 0) {
175 printk(KERN_ERR "Kprobe smoke test failed: "
176 "register_kretprobe returned %d\n", ret);
177 return ret;
180 ret = kprobe_target(rand1);
181 unregister_kretprobe(&rp);
182 if (krph_val != rand1) {
183 printk(KERN_ERR "Kprobe smoke test failed: "
184 "kretprobe handler not called\n");
185 handler_errors++;
188 return 0;
190 #endif /* CONFIG_KRETPROBES */
192 int init_test_probes(void)
194 int ret;
196 do {
197 rand1 = random32();
198 } while (rand1 <= div_factor);
200 printk(KERN_INFO "Kprobe smoke test started\n");
201 num_tests++;
202 ret = test_kprobe();
203 if (ret < 0)
204 errors++;
206 num_tests++;
207 ret = test_jprobe();
208 if (ret < 0)
209 errors++;
211 #ifdef CONFIG_KRETPROBES
212 num_tests++;
213 ret = test_kretprobe();
214 if (ret < 0)
215 errors++;
216 #endif /* CONFIG_KRETPROBES */
218 if (errors)
219 printk(KERN_ERR "BUG: Kprobe smoke test: %d out of "
220 "%d tests failed\n", errors, num_tests);
221 else if (handler_errors)
222 printk(KERN_ERR "BUG: Kprobe smoke test: %d error(s) "
223 "running handlers\n", handler_errors);
224 else
225 printk(KERN_INFO "Kprobe smoke test passed successfully\n");
227 return 0;