aboutsummaryrefslogtreecommitdiffstats
path: root/arch/arm64/lib/error-inject.c
diff options
context:
space:
mode:
authorLeo Yan <leo.yan@linaro.org>2019-08-06 18:00:14 +0800
committerWill Deacon <will@kernel.org>2019-08-07 13:53:09 +0100
commit42d038c4fb00f1ec1a4c4616784da4561385b628 (patch)
treec8c5335e01986c073ae56ca1df94eeed5c13fe1e /arch/arm64/lib/error-inject.c
parent45880f7b7b19e043ce0aaa4cb7d05369425c82fa (diff)
downloadkernel_replicant_linux-42d038c4fb00f1ec1a4c4616784da4561385b628.tar.gz
kernel_replicant_linux-42d038c4fb00f1ec1a4c4616784da4561385b628.tar.bz2
kernel_replicant_linux-42d038c4fb00f1ec1a4c4616784da4561385b628.zip
arm64: Add support for function error injection
Inspired by the commit 7cd01b08d35f ("powerpc: Add support for function error injection"), this patch supports function error injection for Arm64. This patch mainly support two functions: one is regs_set_return_value() which is used to overwrite the return value; the another function is override_function_with_return() which is to override the probed function returning and jump to its caller. Reviewed-by: Masami Hiramatsu <mhiramat@kernel.org> Signed-off-by: Leo Yan <leo.yan@linaro.org> Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'arch/arm64/lib/error-inject.c')
-rw-r--r--arch/arm64/lib/error-inject.c18
1 files changed, 18 insertions, 0 deletions
diff --git a/arch/arm64/lib/error-inject.c b/arch/arm64/lib/error-inject.c
new file mode 100644
index 000000000000..ed15021da3ed
--- /dev/null
+++ b/arch/arm64/lib/error-inject.c
@@ -0,0 +1,18 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <linux/error-injection.h>
+#include <linux/kprobes.h>
+
+void override_function_with_return(struct pt_regs *regs)
+{
+ /*
+ * 'regs' represents the state on entry of a predefined function in
+ * the kernel/module and which is captured on a kprobe.
+ *
+ * When kprobe returns back from exception it will override the end
+ * of probed function and directly return to the predefined
+ * function's caller.
+ */
+ instruction_pointer_set(regs, procedure_link_pointer(regs));
+}
+NOKPROBE_SYMBOL(override_function_with_return);