blob: 8648ed05ccf00e4974237ff1fd77e5a1270dd7ca [file] [log] [blame]
Paul Mundt09a07292009-11-09 16:27:40 +09001/*
2 * arch/sh/kernel/hw_breakpoint.c
3 *
4 * Unified kernel/user-space hardware breakpoint facility for the on-chip UBC.
5 *
Paul Mundt4352fc12010-01-05 19:06:45 +09006 * Copyright (C) 2009 - 2010 Paul Mundt
Paul Mundt09a07292009-11-09 16:27:40 +09007 *
8 * This file is subject to the terms and conditions of the GNU General Public
9 * License. See the file "COPYING" in the main directory of this archive
10 * for more details.
11 */
12#include <linux/init.h>
13#include <linux/perf_event.h>
Ingo Molnar3f07c012017-02-08 18:51:30 +010014#include <linux/sched/signal.h>
Paul Mundt09a07292009-11-09 16:27:40 +090015#include <linux/hw_breakpoint.h>
16#include <linux/percpu.h>
17#include <linux/kallsyms.h>
18#include <linux/notifier.h>
19#include <linux/kprobes.h>
20#include <linux/kdebug.h>
21#include <linux/io.h>
Paul Mundt4352fc12010-01-05 19:06:45 +090022#include <linux/clk.h>
Paul Mundt09a07292009-11-09 16:27:40 +090023#include <asm/hw_breakpoint.h>
24#include <asm/mmu_context.h>
Paul Mundt34d0b5a2009-12-28 17:53:47 +090025#include <asm/ptrace.h>
David Howellse839ca52012-03-28 18:30:03 +010026#include <asm/traps.h>
Paul Mundt09a07292009-11-09 16:27:40 +090027
Paul Mundt09a07292009-11-09 16:27:40 +090028/*
29 * Stores the breakpoints currently in use on each breakpoint address
30 * register for each cpus
31 */
32static DEFINE_PER_CPU(struct perf_event *, bp_per_reg[HBP_NUM]);
33
Paul Mundt4352fc12010-01-05 19:06:45 +090034/*
35 * A dummy placeholder for early accesses until the CPUs get a chance to
36 * register their UBCs later in the boot process.
37 */
38static struct sh_ubc ubc_dummy = { .num_events = 0 };
Paul Mundt09a07292009-11-09 16:27:40 +090039
Paul Mundt4352fc12010-01-05 19:06:45 +090040static struct sh_ubc *sh_ubc __read_mostly = &ubc_dummy;
Paul Mundt09a07292009-11-09 16:27:40 +090041
42/*
43 * Install a perf counter breakpoint.
44 *
45 * We seek a free UBC channel and use it for this breakpoint.
46 *
47 * Atomic: we hold the counter->ctx->lock and we only handle variables
48 * and registers local to this cpu.
49 */
50int arch_install_hw_breakpoint(struct perf_event *bp)
51{
52 struct arch_hw_breakpoint *info = counter_arch_bp(bp);
Paul Mundt09a07292009-11-09 16:27:40 +090053 int i;
54
Paul Mundt4352fc12010-01-05 19:06:45 +090055 for (i = 0; i < sh_ubc->num_events; i++) {
Christoph Lameterc473b2c2014-06-04 16:05:51 -070056 struct perf_event **slot = this_cpu_ptr(&bp_per_reg[i]);
Paul Mundt09a07292009-11-09 16:27:40 +090057
58 if (!*slot) {
59 *slot = bp;
60 break;
61 }
62 }
63
Paul Mundt4352fc12010-01-05 19:06:45 +090064 if (WARN_ONCE(i == sh_ubc->num_events, "Can't find any breakpoint slot"))
Paul Mundt09a07292009-11-09 16:27:40 +090065 return -EBUSY;
66
Paul Mundt4352fc12010-01-05 19:06:45 +090067 clk_enable(sh_ubc->clk);
68 sh_ubc->enable(info, i);
Paul Mundt09a07292009-11-09 16:27:40 +090069
70 return 0;
71}
72
73/*
74 * Uninstall the breakpoint contained in the given counter.
75 *
76 * First we search the debug address register it uses and then we disable
77 * it.
78 *
79 * Atomic: we hold the counter->ctx->lock and we only handle variables
80 * and registers local to this cpu.
81 */
82void arch_uninstall_hw_breakpoint(struct perf_event *bp)
83{
84 struct arch_hw_breakpoint *info = counter_arch_bp(bp);
Paul Mundt09a07292009-11-09 16:27:40 +090085 int i;
86
Paul Mundt4352fc12010-01-05 19:06:45 +090087 for (i = 0; i < sh_ubc->num_events; i++) {
Christoph Lameterc473b2c2014-06-04 16:05:51 -070088 struct perf_event **slot = this_cpu_ptr(&bp_per_reg[i]);
Paul Mundt09a07292009-11-09 16:27:40 +090089
90 if (*slot == bp) {
91 *slot = NULL;
92 break;
93 }
94 }
95
Paul Mundt4352fc12010-01-05 19:06:45 +090096 if (WARN_ONCE(i == sh_ubc->num_events, "Can't find any breakpoint slot"))
Paul Mundt09a07292009-11-09 16:27:40 +090097 return;
98
Paul Mundt4352fc12010-01-05 19:06:45 +090099 sh_ubc->disable(info, i);
100 clk_disable(sh_ubc->clk);
Paul Mundt09a07292009-11-09 16:27:40 +0900101}
102
103static int get_hbp_len(u16 hbp_len)
104{
105 unsigned int len_in_bytes = 0;
106
107 switch (hbp_len) {
108 case SH_BREAKPOINT_LEN_1:
109 len_in_bytes = 1;
110 break;
111 case SH_BREAKPOINT_LEN_2:
112 len_in_bytes = 2;
113 break;
114 case SH_BREAKPOINT_LEN_4:
115 len_in_bytes = 4;
116 break;
117 case SH_BREAKPOINT_LEN_8:
118 len_in_bytes = 8;
119 break;
120 }
121 return len_in_bytes;
122}
123
124/*
Paul Mundt09a07292009-11-09 16:27:40 +0900125 * Check for virtual address in kernel space.
126 */
Frederic Weisbeckerb2812d02010-04-18 18:11:53 +0200127int arch_check_bp_in_kernelspace(struct perf_event *bp)
Paul Mundt09a07292009-11-09 16:27:40 +0900128{
129 unsigned int len;
Frederic Weisbeckerb2812d02010-04-18 18:11:53 +0200130 unsigned long va;
131 struct arch_hw_breakpoint *info = counter_arch_bp(bp);
Paul Mundt09a07292009-11-09 16:27:40 +0900132
Frederic Weisbeckerb2812d02010-04-18 18:11:53 +0200133 va = info->address;
134 len = get_hbp_len(info->len);
Paul Mundt09a07292009-11-09 16:27:40 +0900135
136 return (va >= TASK_SIZE) && ((va + len - 1) >= TASK_SIZE);
137}
138
Paul Mundt09a07292009-11-09 16:27:40 +0900139int arch_bp_generic_fields(int sh_len, int sh_type,
140 int *gen_len, int *gen_type)
141{
142 /* Len */
143 switch (sh_len) {
144 case SH_BREAKPOINT_LEN_1:
145 *gen_len = HW_BREAKPOINT_LEN_1;
146 break;
147 case SH_BREAKPOINT_LEN_2:
148 *gen_len = HW_BREAKPOINT_LEN_2;
149 break;
150 case SH_BREAKPOINT_LEN_4:
151 *gen_len = HW_BREAKPOINT_LEN_4;
152 break;
153 case SH_BREAKPOINT_LEN_8:
154 *gen_len = HW_BREAKPOINT_LEN_8;
155 break;
156 default:
157 return -EINVAL;
158 }
159
160 /* Type */
161 switch (sh_type) {
162 case SH_BREAKPOINT_READ:
163 *gen_type = HW_BREAKPOINT_R;
164 case SH_BREAKPOINT_WRITE:
165 *gen_type = HW_BREAKPOINT_W;
166 break;
167 case SH_BREAKPOINT_RW:
168 *gen_type = HW_BREAKPOINT_W | HW_BREAKPOINT_R;
169 break;
170 default:
171 return -EINVAL;
172 }
173
174 return 0;
175}
176
177static int arch_build_bp_info(struct perf_event *bp)
178{
179 struct arch_hw_breakpoint *info = counter_arch_bp(bp);
180
181 info->address = bp->attr.bp_addr;
182
183 /* Len */
184 switch (bp->attr.bp_len) {
185 case HW_BREAKPOINT_LEN_1:
186 info->len = SH_BREAKPOINT_LEN_1;
187 break;
188 case HW_BREAKPOINT_LEN_2:
189 info->len = SH_BREAKPOINT_LEN_2;
190 break;
191 case HW_BREAKPOINT_LEN_4:
192 info->len = SH_BREAKPOINT_LEN_4;
193 break;
194 case HW_BREAKPOINT_LEN_8:
195 info->len = SH_BREAKPOINT_LEN_8;
196 break;
197 default:
198 return -EINVAL;
199 }
200
201 /* Type */
202 switch (bp->attr.bp_type) {
203 case HW_BREAKPOINT_R:
204 info->type = SH_BREAKPOINT_READ;
205 break;
206 case HW_BREAKPOINT_W:
207 info->type = SH_BREAKPOINT_WRITE;
208 break;
209 case HW_BREAKPOINT_W | HW_BREAKPOINT_R:
210 info->type = SH_BREAKPOINT_RW;
211 break;
212 default:
213 return -EINVAL;
214 }
215
216 return 0;
217}
218
219/*
220 * Validate the arch-specific HW Breakpoint register settings
221 */
Frederic Weisbeckerb2812d02010-04-18 18:11:53 +0200222int arch_validate_hwbkpt_settings(struct perf_event *bp)
Paul Mundt09a07292009-11-09 16:27:40 +0900223{
224 struct arch_hw_breakpoint *info = counter_arch_bp(bp);
225 unsigned int align;
226 int ret;
227
228 ret = arch_build_bp_info(bp);
229 if (ret)
230 return ret;
231
232 ret = -EINVAL;
233
234 switch (info->len) {
235 case SH_BREAKPOINT_LEN_1:
236 align = 0;
237 break;
238 case SH_BREAKPOINT_LEN_2:
239 align = 1;
240 break;
241 case SH_BREAKPOINT_LEN_4:
242 align = 3;
243 break;
244 case SH_BREAKPOINT_LEN_8:
245 align = 7;
246 break;
247 default:
248 return ret;
249 }
250
Paul Mundt105244e2010-03-01 11:52:03 +0900251 /*
252 * For kernel-addresses, either the address or symbol name can be
253 * specified.
254 */
255 if (info->name)
256 info->address = (unsigned long)kallsyms_lookup_name(info->name);
Paul Mundt09a07292009-11-09 16:27:40 +0900257
258 /*
259 * Check that the low-order bits of the address are appropriate
260 * for the alignment implied by len.
261 */
262 if (info->address & align)
263 return -EINVAL;
264
Paul Mundt09a07292009-11-09 16:27:40 +0900265 return 0;
266}
267
268/*
269 * Release the user breakpoints used by ptrace
270 */
271void flush_ptrace_hw_breakpoint(struct task_struct *tsk)
272{
273 int i;
274 struct thread_struct *t = &tsk->thread;
275
Paul Mundt4352fc12010-01-05 19:06:45 +0900276 for (i = 0; i < sh_ubc->num_events; i++) {
Paul Mundt09a07292009-11-09 16:27:40 +0900277 unregister_hw_breakpoint(t->ptrace_bps[i]);
278 t->ptrace_bps[i] = NULL;
279 }
280}
281
282static int __kprobes hw_breakpoint_handler(struct die_args *args)
283{
284 int cpu, i, rc = NOTIFY_STOP;
285 struct perf_event *bp;
Paul Mundt4352fc12010-01-05 19:06:45 +0900286 unsigned int cmf, resume_mask;
Paul Mundt09a07292009-11-09 16:27:40 +0900287
Paul Mundt4352fc12010-01-05 19:06:45 +0900288 /*
289 * Do an early return if none of the channels triggered.
290 */
291 cmf = sh_ubc->triggered_mask();
292 if (unlikely(!cmf))
293 return NOTIFY_DONE;
294
295 /*
296 * By default, resume all of the active channels.
297 */
298 resume_mask = sh_ubc->active_mask();
299
300 /*
301 * Disable breakpoints during exception handling.
302 */
303 sh_ubc->disable_all();
Paul Mundt09a07292009-11-09 16:27:40 +0900304
305 cpu = get_cpu();
Paul Mundt4352fc12010-01-05 19:06:45 +0900306 for (i = 0; i < sh_ubc->num_events; i++) {
307 unsigned long event_mask = (1 << i);
308
309 if (likely(!(cmf & event_mask)))
310 continue;
311
Paul Mundt09a07292009-11-09 16:27:40 +0900312 /*
313 * The counter may be concurrently released but that can only
314 * occur from a call_rcu() path. We can then safely fetch
315 * the breakpoint, use its callback, touch its counter
316 * while we are in an rcu_read_lock() path.
317 */
318 rcu_read_lock();
319
320 bp = per_cpu(bp_per_reg[i], cpu);
Paul Mundt4352fc12010-01-05 19:06:45 +0900321 if (bp)
Paul Mundt09a07292009-11-09 16:27:40 +0900322 rc = NOTIFY_DONE;
Paul Mundt4352fc12010-01-05 19:06:45 +0900323
324 /*
325 * Reset the condition match flag to denote completion of
326 * exception handling.
327 */
328 sh_ubc->clear_triggered_mask(event_mask);
329
330 /*
331 * bp can be NULL due to concurrent perf counter
332 * removing.
333 */
334 if (!bp) {
Paul Mundt09a07292009-11-09 16:27:40 +0900335 rcu_read_unlock();
336 break;
337 }
338
Paul Mundt4352fc12010-01-05 19:06:45 +0900339 /*
340 * Don't restore the channel if the breakpoint is from
341 * ptrace, as it always operates in one-shot mode.
342 */
343 if (bp->overflow_handler == ptrace_triggered)
344 resume_mask &= ~(1 << i);
345
Paul Mundta28b4602009-12-21 15:56:24 +0900346 perf_bp_event(bp, args->regs);
Paul Mundt09a07292009-11-09 16:27:40 +0900347
Paul Mundt4352fc12010-01-05 19:06:45 +0900348 /* Deliver the signal to userspace */
Frederic Weisbeckerb2812d02010-04-18 18:11:53 +0200349 if (!arch_check_bp_in_kernelspace(bp)) {
Eric W. Biederman195bce72018-04-17 14:59:42 -0500350 force_sig_fault(SIGTRAP, TRAP_HWBKPT,
351 (void __user *)NULL, current);
Paul Mundt4352fc12010-01-05 19:06:45 +0900352 }
353
Paul Mundt09a07292009-11-09 16:27:40 +0900354 rcu_read_unlock();
355 }
356
Paul Mundt4352fc12010-01-05 19:06:45 +0900357 if (cmf == 0)
358 rc = NOTIFY_DONE;
Paul Mundt09a07292009-11-09 16:27:40 +0900359
Paul Mundt4352fc12010-01-05 19:06:45 +0900360 sh_ubc->enable_all(resume_mask);
Paul Mundt09a07292009-11-09 16:27:40 +0900361
362 put_cpu();
363
364 return rc;
365}
366
367BUILD_TRAP_HANDLER(breakpoint)
368{
369 unsigned long ex = lookup_exception_vector();
370 TRAP_HANDLER_DECL;
371
Paul Mundt4352fc12010-01-05 19:06:45 +0900372 notify_die(DIE_BREAKPOINT, "breakpoint", regs, 0, ex, SIGTRAP);
Paul Mundt09a07292009-11-09 16:27:40 +0900373}
374
375/*
376 * Handle debug exception notifications.
377 */
378int __kprobes hw_breakpoint_exceptions_notify(struct notifier_block *unused,
379 unsigned long val, void *data)
380{
Paul Mundtb74ab702009-12-22 12:40:38 +0900381 struct die_args *args = data;
382
Paul Mundt09a07292009-11-09 16:27:40 +0900383 if (val != DIE_BREAKPOINT)
384 return NOTIFY_DONE;
385
Paul Mundtb74ab702009-12-22 12:40:38 +0900386 /*
387 * If the breakpoint hasn't been triggered by the UBC, it's
388 * probably from a debugger, so don't do anything more here.
Paul Mundt4352fc12010-01-05 19:06:45 +0900389 *
390 * This also permits the UBC interface clock to remain off for
391 * non-UBC breakpoints, as we don't need to check the triggered
392 * or active channel masks.
Paul Mundtb74ab702009-12-22 12:40:38 +0900393 */
Paul Mundt4352fc12010-01-05 19:06:45 +0900394 if (args->trapnr != sh_ubc->trap_nr)
Paul Mundtb74ab702009-12-22 12:40:38 +0900395 return NOTIFY_DONE;
396
Paul Mundt09a07292009-11-09 16:27:40 +0900397 return hw_breakpoint_handler(data);
398}
399
400void hw_breakpoint_pmu_read(struct perf_event *bp)
401{
402 /* TODO */
403}
404
Paul Mundt4352fc12010-01-05 19:06:45 +0900405int register_sh_ubc(struct sh_ubc *ubc)
406{
407 /* Bail if it's already assigned */
408 if (sh_ubc != &ubc_dummy)
409 return -EBUSY;
410 sh_ubc = ubc;
411
412 pr_info("HW Breakpoints: %s UBC support registered\n", ubc->name);
413
414 WARN_ON(ubc->num_events > HBP_NUM);
415
416 return 0;
417}