| .. | .. |
|---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-only |
|---|
| 1 | 2 | /* |
|---|
| 2 | 3 | * ARMv8 single-step debug support and mdscr context switching. |
|---|
| 3 | 4 | * |
|---|
| 4 | 5 | * Copyright (C) 2012 ARM Limited |
|---|
| 5 | | - * |
|---|
| 6 | | - * This program is free software; you can redistribute it and/or modify |
|---|
| 7 | | - * it under the terms of the GNU General Public License version 2 as |
|---|
| 8 | | - * published by the Free Software Foundation. |
|---|
| 9 | | - * |
|---|
| 10 | | - * This program is distributed in the hope that it will be useful, |
|---|
| 11 | | - * but WITHOUT ANY WARRANTY; without even the implied warranty of |
|---|
| 12 | | - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|---|
| 13 | | - * GNU General Public License for more details. |
|---|
| 14 | | - * |
|---|
| 15 | | - * You should have received a copy of the GNU General Public License |
|---|
| 16 | | - * along with this program. If not, see <http://www.gnu.org/licenses/>. |
|---|
| 17 | 6 | * |
|---|
| 18 | 7 | * Author: Will Deacon <will.deacon@arm.com> |
|---|
| 19 | 8 | */ |
|---|
| .. | .. |
|---|
| 141 | 130 | return 0; |
|---|
| 142 | 131 | } |
|---|
| 143 | 132 | |
|---|
| 144 | | -static int debug_monitors_init(void) |
|---|
| 133 | +static int __init debug_monitors_init(void) |
|---|
| 145 | 134 | { |
|---|
| 146 | 135 | return cpuhp_setup_state(CPUHP_AP_ARM64_DEBUG_MONITORS_STARTING, |
|---|
| 147 | 136 | "arm64/debug_monitors:starting", |
|---|
| .. | .. |
|---|
| 167 | 156 | #define set_regs_spsr_ss(r) set_user_regs_spsr_ss(&(r)->user_regs) |
|---|
| 168 | 157 | #define clear_regs_spsr_ss(r) clear_user_regs_spsr_ss(&(r)->user_regs) |
|---|
| 169 | 158 | |
|---|
| 170 | | -/* EL1 Single Step Handler hooks */ |
|---|
| 171 | | -static LIST_HEAD(step_hook); |
|---|
| 172 | | -static DEFINE_SPINLOCK(step_hook_lock); |
|---|
| 159 | +static DEFINE_SPINLOCK(debug_hook_lock); |
|---|
| 160 | +static LIST_HEAD(user_step_hook); |
|---|
| 161 | +static LIST_HEAD(kernel_step_hook); |
|---|
| 173 | 162 | |
|---|
| 174 | | -void register_step_hook(struct step_hook *hook) |
|---|
| 163 | +static void register_debug_hook(struct list_head *node, struct list_head *list) |
|---|
| 175 | 164 | { |
|---|
| 176 | | - spin_lock(&step_hook_lock); |
|---|
| 177 | | - list_add_rcu(&hook->node, &step_hook); |
|---|
| 178 | | - spin_unlock(&step_hook_lock); |
|---|
| 165 | + spin_lock(&debug_hook_lock); |
|---|
| 166 | + list_add_rcu(node, list); |
|---|
| 167 | + spin_unlock(&debug_hook_lock); |
|---|
| 168 | + |
|---|
| 179 | 169 | } |
|---|
| 180 | 170 | |
|---|
| 181 | | -void unregister_step_hook(struct step_hook *hook) |
|---|
| 171 | +static void unregister_debug_hook(struct list_head *node) |
|---|
| 182 | 172 | { |
|---|
| 183 | | - spin_lock(&step_hook_lock); |
|---|
| 184 | | - list_del_rcu(&hook->node); |
|---|
| 185 | | - spin_unlock(&step_hook_lock); |
|---|
| 173 | + spin_lock(&debug_hook_lock); |
|---|
| 174 | + list_del_rcu(node); |
|---|
| 175 | + spin_unlock(&debug_hook_lock); |
|---|
| 186 | 176 | synchronize_rcu(); |
|---|
| 177 | +} |
|---|
| 178 | + |
|---|
| 179 | +void register_user_step_hook(struct step_hook *hook) |
|---|
| 180 | +{ |
|---|
| 181 | + register_debug_hook(&hook->node, &user_step_hook); |
|---|
| 182 | +} |
|---|
| 183 | + |
|---|
| 184 | +void unregister_user_step_hook(struct step_hook *hook) |
|---|
| 185 | +{ |
|---|
| 186 | + unregister_debug_hook(&hook->node); |
|---|
| 187 | +} |
|---|
| 188 | + |
|---|
| 189 | +void register_kernel_step_hook(struct step_hook *hook) |
|---|
| 190 | +{ |
|---|
| 191 | + register_debug_hook(&hook->node, &kernel_step_hook); |
|---|
| 192 | +} |
|---|
| 193 | + |
|---|
| 194 | +void unregister_kernel_step_hook(struct step_hook *hook) |
|---|
| 195 | +{ |
|---|
| 196 | + unregister_debug_hook(&hook->node); |
|---|
| 187 | 197 | } |
|---|
| 188 | 198 | |
|---|
| 189 | 199 | /* |
|---|
| .. | .. |
|---|
| 195 | 205 | static int call_step_hook(struct pt_regs *regs, unsigned int esr) |
|---|
| 196 | 206 | { |
|---|
| 197 | 207 | struct step_hook *hook; |
|---|
| 208 | + struct list_head *list; |
|---|
| 198 | 209 | int retval = DBG_HOOK_ERROR; |
|---|
| 199 | 210 | |
|---|
| 200 | | - rcu_read_lock(); |
|---|
| 211 | + list = user_mode(regs) ? &user_step_hook : &kernel_step_hook; |
|---|
| 201 | 212 | |
|---|
| 202 | | - list_for_each_entry_rcu(hook, &step_hook, node) { |
|---|
| 213 | + /* |
|---|
| 214 | + * Since single-step exception disables interrupt, this function is |
|---|
| 215 | + * entirely not preemptible, and we can use rcu list safely here. |
|---|
| 216 | + */ |
|---|
| 217 | + list_for_each_entry_rcu(hook, list, node) { |
|---|
| 203 | 218 | retval = hook->fn(regs, esr); |
|---|
| 204 | 219 | if (retval == DBG_HOOK_HANDLED) |
|---|
| 205 | 220 | break; |
|---|
| 206 | 221 | } |
|---|
| 207 | | - |
|---|
| 208 | | - rcu_read_unlock(); |
|---|
| 209 | 222 | |
|---|
| 210 | 223 | return retval; |
|---|
| 211 | 224 | } |
|---|
| .. | .. |
|---|
| 214 | 227 | static void send_user_sigtrap(int si_code) |
|---|
| 215 | 228 | { |
|---|
| 216 | 229 | struct pt_regs *regs = current_pt_regs(); |
|---|
| 217 | | - siginfo_t info; |
|---|
| 218 | | - |
|---|
| 219 | | - clear_siginfo(&info); |
|---|
| 220 | | - info.si_signo = SIGTRAP; |
|---|
| 221 | | - info.si_errno = 0; |
|---|
| 222 | | - info.si_code = si_code; |
|---|
| 223 | | - info.si_addr = (void __user *)instruction_pointer(regs); |
|---|
| 224 | 230 | |
|---|
| 225 | 231 | if (WARN_ON(!user_mode(regs))) |
|---|
| 226 | 232 | return; |
|---|
| .. | .. |
|---|
| 228 | 234 | if (interrupts_enabled(regs)) |
|---|
| 229 | 235 | local_irq_enable(); |
|---|
| 230 | 236 | |
|---|
| 231 | | - arm64_force_sig_info(&info, "User debug trap", current); |
|---|
| 237 | + arm64_force_sig_fault(SIGTRAP, si_code, instruction_pointer(regs), |
|---|
| 238 | + "User debug trap"); |
|---|
| 232 | 239 | } |
|---|
| 233 | 240 | |
|---|
| 234 | | -static int single_step_handler(unsigned long addr, unsigned int esr, |
|---|
| 241 | +static int single_step_handler(unsigned long unused, unsigned int esr, |
|---|
| 235 | 242 | struct pt_regs *regs) |
|---|
| 236 | 243 | { |
|---|
| 237 | 244 | bool handler_found = false; |
|---|
| .. | .. |
|---|
| 243 | 250 | if (!reinstall_suspended_bps(regs)) |
|---|
| 244 | 251 | return 0; |
|---|
| 245 | 252 | |
|---|
| 246 | | -#ifdef CONFIG_KPROBES |
|---|
| 247 | | - if (kprobe_single_step_handler(regs, esr) == DBG_HOOK_HANDLED) |
|---|
| 248 | | - handler_found = true; |
|---|
| 249 | | -#endif |
|---|
| 250 | 253 | if (!handler_found && call_step_hook(regs, esr) == DBG_HOOK_HANDLED) |
|---|
| 251 | 254 | handler_found = true; |
|---|
| 252 | 255 | |
|---|
| .. | .. |
|---|
| 273 | 276 | } |
|---|
| 274 | 277 | NOKPROBE_SYMBOL(single_step_handler); |
|---|
| 275 | 278 | |
|---|
| 276 | | -/* |
|---|
| 277 | | - * Breakpoint handler is re-entrant as another breakpoint can |
|---|
| 278 | | - * hit within breakpoint handler, especically in kprobes. |
|---|
| 279 | | - * Use reader/writer locks instead of plain spinlock. |
|---|
| 280 | | - */ |
|---|
| 281 | | -static LIST_HEAD(break_hook); |
|---|
| 282 | | -static DEFINE_SPINLOCK(break_hook_lock); |
|---|
| 279 | +static LIST_HEAD(user_break_hook); |
|---|
| 280 | +static LIST_HEAD(kernel_break_hook); |
|---|
| 283 | 281 | |
|---|
| 284 | | -void register_break_hook(struct break_hook *hook) |
|---|
| 282 | +void register_user_break_hook(struct break_hook *hook) |
|---|
| 285 | 283 | { |
|---|
| 286 | | - spin_lock(&break_hook_lock); |
|---|
| 287 | | - list_add_rcu(&hook->node, &break_hook); |
|---|
| 288 | | - spin_unlock(&break_hook_lock); |
|---|
| 284 | + register_debug_hook(&hook->node, &user_break_hook); |
|---|
| 289 | 285 | } |
|---|
| 290 | 286 | |
|---|
| 291 | | -void unregister_break_hook(struct break_hook *hook) |
|---|
| 287 | +void unregister_user_break_hook(struct break_hook *hook) |
|---|
| 292 | 288 | { |
|---|
| 293 | | - spin_lock(&break_hook_lock); |
|---|
| 294 | | - list_del_rcu(&hook->node); |
|---|
| 295 | | - spin_unlock(&break_hook_lock); |
|---|
| 296 | | - synchronize_rcu(); |
|---|
| 289 | + unregister_debug_hook(&hook->node); |
|---|
| 290 | +} |
|---|
| 291 | + |
|---|
| 292 | +void register_kernel_break_hook(struct break_hook *hook) |
|---|
| 293 | +{ |
|---|
| 294 | + register_debug_hook(&hook->node, &kernel_break_hook); |
|---|
| 295 | +} |
|---|
| 296 | +EXPORT_SYMBOL_GPL(register_kernel_break_hook); |
|---|
| 297 | + |
|---|
| 298 | +void unregister_kernel_break_hook(struct break_hook *hook) |
|---|
| 299 | +{ |
|---|
| 300 | + unregister_debug_hook(&hook->node); |
|---|
| 297 | 301 | } |
|---|
| 298 | 302 | |
|---|
| 299 | 303 | static int call_break_hook(struct pt_regs *regs, unsigned int esr) |
|---|
| 300 | 304 | { |
|---|
| 301 | 305 | struct break_hook *hook; |
|---|
| 306 | + struct list_head *list; |
|---|
| 302 | 307 | int (*fn)(struct pt_regs *regs, unsigned int esr) = NULL; |
|---|
| 303 | 308 | |
|---|
| 304 | | - rcu_read_lock(); |
|---|
| 305 | | - list_for_each_entry_rcu(hook, &break_hook, node) |
|---|
| 306 | | - if ((esr & hook->esr_mask) == hook->esr_val) |
|---|
| 309 | + list = user_mode(regs) ? &user_break_hook : &kernel_break_hook; |
|---|
| 310 | + |
|---|
| 311 | + /* |
|---|
| 312 | + * Since brk exception disables interrupt, this function is |
|---|
| 313 | + * entirely not preemptible, and we can use rcu list safely here. |
|---|
| 314 | + */ |
|---|
| 315 | + list_for_each_entry_rcu(hook, list, node) { |
|---|
| 316 | + unsigned int comment = esr & ESR_ELx_BRK64_ISS_COMMENT_MASK; |
|---|
| 317 | + |
|---|
| 318 | + if ((comment & ~hook->mask) == hook->imm) |
|---|
| 307 | 319 | fn = hook->fn; |
|---|
| 308 | | - rcu_read_unlock(); |
|---|
| 320 | + } |
|---|
| 309 | 321 | |
|---|
| 310 | 322 | return fn ? fn(regs, esr) : DBG_HOOK_ERROR; |
|---|
| 311 | 323 | } |
|---|
| 312 | 324 | NOKPROBE_SYMBOL(call_break_hook); |
|---|
| 313 | 325 | |
|---|
| 314 | | -static int brk_handler(unsigned long addr, unsigned int esr, |
|---|
| 326 | +static int brk_handler(unsigned long unused, unsigned int esr, |
|---|
| 315 | 327 | struct pt_regs *regs) |
|---|
| 316 | 328 | { |
|---|
| 317 | | - bool handler_found = false; |
|---|
| 329 | + if (call_break_hook(regs, esr) == DBG_HOOK_HANDLED) |
|---|
| 330 | + return 0; |
|---|
| 318 | 331 | |
|---|
| 319 | | -#ifdef CONFIG_KPROBES |
|---|
| 320 | | - if ((esr & BRK64_ESR_MASK) == BRK64_ESR_KPROBES) { |
|---|
| 321 | | - if (kprobe_breakpoint_handler(regs, esr) == DBG_HOOK_HANDLED) |
|---|
| 322 | | - handler_found = true; |
|---|
| 323 | | - } |
|---|
| 324 | | -#endif |
|---|
| 325 | | - if (!handler_found && call_break_hook(regs, esr) == DBG_HOOK_HANDLED) |
|---|
| 326 | | - handler_found = true; |
|---|
| 327 | | - |
|---|
| 328 | | - if (!handler_found && user_mode(regs)) { |
|---|
| 332 | + if (user_mode(regs)) { |
|---|
| 329 | 333 | send_user_sigtrap(TRAP_BRKPT); |
|---|
| 330 | | - } else if (!handler_found) { |
|---|
| 334 | + } else { |
|---|
| 331 | 335 | pr_warn("Unexpected kernel BRK exception at EL1\n"); |
|---|
| 332 | 336 | return -EFAULT; |
|---|
| 333 | 337 | } |
|---|
| .. | .. |
|---|
| 375 | 379 | } |
|---|
| 376 | 380 | NOKPROBE_SYMBOL(aarch32_break_handler); |
|---|
| 377 | 381 | |
|---|
| 378 | | -static int __init debug_traps_init(void) |
|---|
| 382 | +void __init debug_traps_init(void) |
|---|
| 379 | 383 | { |
|---|
| 380 | 384 | hook_debug_fault_code(DBG_ESR_EVT_HWSS, single_step_handler, SIGTRAP, |
|---|
| 381 | 385 | TRAP_TRACE, "single-step handler"); |
|---|
| 382 | 386 | hook_debug_fault_code(DBG_ESR_EVT_BRK, brk_handler, SIGTRAP, |
|---|
| 383 | | - TRAP_BRKPT, "ptrace BRK handler"); |
|---|
| 384 | | - return 0; |
|---|
| 387 | + TRAP_BRKPT, "BRK handler"); |
|---|
| 385 | 388 | } |
|---|
| 386 | | -arch_initcall(debug_traps_init); |
|---|
| 387 | 389 | |
|---|
| 388 | 390 | /* Re-enable single step for syscall restarting. */ |
|---|
| 389 | 391 | void user_rewind_single_step(struct task_struct *task) |
|---|