1 /* 2 * AArch64 KGDB support 3 * 4 * Based on arch/arm/kernel/kgdb.c 5 * 6 * Copyright (C) 2013 Cavium Inc. 7 * Author: Vijaya Kumar K <vijaya.kumar@caviumnetworks.com> 8 * 9 * This program is free software; you can redistribute it and/or modify 10 * it under the terms of the GNU General Public License version 2 as 11 * published by the Free Software Foundation. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program. If not, see <http://www.gnu.org/licenses/>. 20 */ 21 22 #include <linux/bug.h> 23 #include <linux/irq.h> 24 #include <linux/kdebug.h> 25 #include <linux/kgdb.h> 26 #include <linux/kprobes.h> 27 #include <linux/sched/task_stack.h> 28 29 #include <asm/debug-monitors.h> 30 #include <asm/insn.h> 31 #include <asm/traps.h> 32 33 struct dbg_reg_def_t dbg_reg_def[DBG_MAX_REG_NUM] = { 34 { "x0", 8, offsetof(struct pt_regs, regs[0])}, 35 { "x1", 8, offsetof(struct pt_regs, regs[1])}, 36 { "x2", 8, offsetof(struct pt_regs, regs[2])}, 37 { "x3", 8, offsetof(struct pt_regs, regs[3])}, 38 { "x4", 8, offsetof(struct pt_regs, regs[4])}, 39 { "x5", 8, offsetof(struct pt_regs, regs[5])}, 40 { "x6", 8, offsetof(struct pt_regs, regs[6])}, 41 { "x7", 8, offsetof(struct pt_regs, regs[7])}, 42 { "x8", 8, offsetof(struct pt_regs, regs[8])}, 43 { "x9", 8, offsetof(struct pt_regs, regs[9])}, 44 { "x10", 8, offsetof(struct pt_regs, regs[10])}, 45 { "x11", 8, offsetof(struct pt_regs, regs[11])}, 46 { "x12", 8, offsetof(struct pt_regs, regs[12])}, 47 { "x13", 8, offsetof(struct pt_regs, regs[13])}, 48 { "x14", 8, offsetof(struct pt_regs, regs[14])}, 49 { "x15", 8, offsetof(struct pt_regs, regs[15])}, 50 { "x16", 8, offsetof(struct pt_regs, regs[16])}, 51 { "x17", 8, offsetof(struct pt_regs, regs[17])}, 52 { "x18", 8, offsetof(struct pt_regs, regs[18])}, 53 { "x19", 8, offsetof(struct pt_regs, regs[19])}, 54 { "x20", 8, offsetof(struct pt_regs, regs[20])}, 55 { "x21", 8, offsetof(struct pt_regs, regs[21])}, 56 { "x22", 8, offsetof(struct pt_regs, regs[22])}, 57 { "x23", 8, offsetof(struct pt_regs, regs[23])}, 58 { "x24", 8, offsetof(struct pt_regs, regs[24])}, 59 { "x25", 8, offsetof(struct pt_regs, regs[25])}, 60 { "x26", 8, offsetof(struct pt_regs, regs[26])}, 61 { "x27", 8, offsetof(struct pt_regs, regs[27])}, 62 { "x28", 8, offsetof(struct pt_regs, regs[28])}, 63 { "x29", 8, offsetof(struct pt_regs, regs[29])}, 64 { "x30", 8, offsetof(struct pt_regs, regs[30])}, 65 { "sp", 8, offsetof(struct pt_regs, sp)}, 66 { "pc", 8, offsetof(struct pt_regs, pc)}, 67 /* 68 * struct pt_regs thinks PSTATE is 64-bits wide but gdb remote 69 * protocol disagrees. Therefore we must extract only the lower 70 * 32-bits. Look for the big comment in asm/kgdb.h for more 71 * detail. 72 */ 73 { "pstate", 4, offsetof(struct pt_regs, pstate) 74 #ifdef CONFIG_CPU_BIG_ENDIAN 75 + 4 76 #endif 77 }, 78 { "v0", 16, -1 }, 79 { "v1", 16, -1 }, 80 { "v2", 16, -1 }, 81 { "v3", 16, -1 }, 82 { "v4", 16, -1 }, 83 { "v5", 16, -1 }, 84 { "v6", 16, -1 }, 85 { "v7", 16, -1 }, 86 { "v8", 16, -1 }, 87 { "v9", 16, -1 }, 88 { "v10", 16, -1 }, 89 { "v11", 16, -1 }, 90 { "v12", 16, -1 }, 91 { "v13", 16, -1 }, 92 { "v14", 16, -1 }, 93 { "v15", 16, -1 }, 94 { "v16", 16, -1 }, 95 { "v17", 16, -1 }, 96 { "v18", 16, -1 }, 97 { "v19", 16, -1 }, 98 { "v20", 16, -1 }, 99 { "v21", 16, -1 }, 100 { "v22", 16, -1 }, 101 { "v23", 16, -1 }, 102 { "v24", 16, -1 }, 103 { "v25", 16, -1 }, 104 { "v26", 16, -1 }, 105 { "v27", 16, -1 }, 106 { "v28", 16, -1 }, 107 { "v29", 16, -1 }, 108 { "v30", 16, -1 }, 109 { "v31", 16, -1 }, 110 { "fpsr", 4, -1 }, 111 { "fpcr", 4, -1 }, 112 }; 113 114 char *dbg_get_reg(int regno, void *mem, struct pt_regs *regs) 115 { 116 if (regno >= DBG_MAX_REG_NUM || regno < 0) 117 return NULL; 118 119 if (dbg_reg_def[regno].offset != -1) 120 memcpy(mem, (void *)regs + dbg_reg_def[regno].offset, 121 dbg_reg_def[regno].size); 122 else 123 memset(mem, 0, dbg_reg_def[regno].size); 124 return dbg_reg_def[regno].name; 125 } 126 127 int dbg_set_reg(int regno, void *mem, struct pt_regs *regs) 128 { 129 if (regno >= DBG_MAX_REG_NUM || regno < 0) 130 return -EINVAL; 131 132 if (dbg_reg_def[regno].offset != -1) 133 memcpy((void *)regs + dbg_reg_def[regno].offset, mem, 134 dbg_reg_def[regno].size); 135 return 0; 136 } 137 138 void 139 sleeping_thread_to_gdb_regs(unsigned long *gdb_regs, struct task_struct *task) 140 { 141 struct cpu_context *cpu_context = &task->thread.cpu_context; 142 143 /* Initialize to zero */ 144 memset((char *)gdb_regs, 0, NUMREGBYTES); 145 146 gdb_regs[19] = cpu_context->x19; 147 gdb_regs[20] = cpu_context->x20; 148 gdb_regs[21] = cpu_context->x21; 149 gdb_regs[22] = cpu_context->x22; 150 gdb_regs[23] = cpu_context->x23; 151 gdb_regs[24] = cpu_context->x24; 152 gdb_regs[25] = cpu_context->x25; 153 gdb_regs[26] = cpu_context->x26; 154 gdb_regs[27] = cpu_context->x27; 155 gdb_regs[28] = cpu_context->x28; 156 gdb_regs[29] = cpu_context->fp; 157 158 gdb_regs[31] = cpu_context->sp; 159 gdb_regs[32] = cpu_context->pc; 160 } 161 162 void kgdb_arch_set_pc(struct pt_regs *regs, unsigned long pc) 163 { 164 regs->pc = pc; 165 } 166 167 static int compiled_break; 168 169 static void kgdb_arch_update_addr(struct pt_regs *regs, 170 char *remcom_in_buffer) 171 { 172 unsigned long addr; 173 char *ptr; 174 175 ptr = &remcom_in_buffer[1]; 176 if (kgdb_hex2long(&ptr, &addr)) 177 kgdb_arch_set_pc(regs, addr); 178 else if (compiled_break == 1) 179 kgdb_arch_set_pc(regs, regs->pc + 4); 180 181 compiled_break = 0; 182 } 183 184 int kgdb_arch_handle_exception(int exception_vector, int signo, 185 int err_code, char *remcom_in_buffer, 186 char *remcom_out_buffer, 187 struct pt_regs *linux_regs) 188 { 189 int err; 190 191 switch (remcom_in_buffer[0]) { 192 case 'D': 193 case 'k': 194 /* 195 * Packet D (Detach), k (kill). No special handling 196 * is required here. Handle same as c packet. 197 */ 198 case 'c': 199 /* 200 * Packet c (Continue) to continue executing. 201 * Set pc to required address. 202 * Try to read optional parameter and set pc. 203 * If this was a compiled breakpoint, we need to move 204 * to the next instruction else we will just breakpoint 205 * over and over again. 206 */ 207 kgdb_arch_update_addr(linux_regs, remcom_in_buffer); 208 atomic_set(&kgdb_cpu_doing_single_step, -1); 209 kgdb_single_step = 0; 210 211 /* 212 * Received continue command, disable single step 213 */ 214 if (kernel_active_single_step()) 215 kernel_disable_single_step(); 216 217 err = 0; 218 break; 219 case 's': 220 /* 221 * Update step address value with address passed 222 * with step packet. 223 * On debug exception return PC is copied to ELR 224 * So just update PC. 225 * If no step address is passed, resume from the address 226 * pointed by PC. Do not update PC 227 */ 228 kgdb_arch_update_addr(linux_regs, remcom_in_buffer); 229 atomic_set(&kgdb_cpu_doing_single_step, raw_smp_processor_id()); 230 kgdb_single_step = 1; 231 232 /* 233 * Enable single step handling 234 */ 235 if (!kernel_active_single_step()) 236 kernel_enable_single_step(linux_regs); 237 err = 0; 238 break; 239 default: 240 err = -1; 241 } 242 return err; 243 } 244 245 static int kgdb_brk_fn(struct pt_regs *regs, unsigned int esr) 246 { 247 if (user_mode(regs)) 248 return DBG_HOOK_ERROR; 249 250 kgdb_handle_exception(1, SIGTRAP, 0, regs); 251 return DBG_HOOK_HANDLED; 252 } 253 NOKPROBE_SYMBOL(kgdb_brk_fn) 254 255 static int kgdb_compiled_brk_fn(struct pt_regs *regs, unsigned int esr) 256 { 257 if (user_mode(regs)) 258 return DBG_HOOK_ERROR; 259 260 compiled_break = 1; 261 kgdb_handle_exception(1, SIGTRAP, 0, regs); 262 263 return DBG_HOOK_HANDLED; 264 } 265 NOKPROBE_SYMBOL(kgdb_compiled_brk_fn); 266 267 static int kgdb_step_brk_fn(struct pt_regs *regs, unsigned int esr) 268 { 269 if (user_mode(regs) || !kgdb_single_step) 270 return DBG_HOOK_ERROR; 271 272 kgdb_handle_exception(1, SIGTRAP, 0, regs); 273 return DBG_HOOK_HANDLED; 274 } 275 NOKPROBE_SYMBOL(kgdb_step_brk_fn); 276 277 static struct break_hook kgdb_brkpt_hook = { 278 .esr_mask = 0xffffffff, 279 .esr_val = (u32)ESR_ELx_VAL_BRK64(KGDB_DYN_DBG_BRK_IMM), 280 .fn = kgdb_brk_fn 281 }; 282 283 static struct break_hook kgdb_compiled_brkpt_hook = { 284 .esr_mask = 0xffffffff, 285 .esr_val = (u32)ESR_ELx_VAL_BRK64(KGDB_COMPILED_DBG_BRK_IMM), 286 .fn = kgdb_compiled_brk_fn 287 }; 288 289 static struct step_hook kgdb_step_hook = { 290 .fn = kgdb_step_brk_fn 291 }; 292 293 static int __kgdb_notify(struct die_args *args, unsigned long cmd) 294 { 295 struct pt_regs *regs = args->regs; 296 297 if (kgdb_handle_exception(1, args->signr, cmd, regs)) 298 return NOTIFY_DONE; 299 return NOTIFY_STOP; 300 } 301 302 static int 303 kgdb_notify(struct notifier_block *self, unsigned long cmd, void *ptr) 304 { 305 unsigned long flags; 306 int ret; 307 308 local_irq_save(flags); 309 ret = __kgdb_notify(ptr, cmd); 310 local_irq_restore(flags); 311 312 return ret; 313 } 314 315 static struct notifier_block kgdb_notifier = { 316 .notifier_call = kgdb_notify, 317 /* 318 * Want to be lowest priority 319 */ 320 .priority = -INT_MAX, 321 }; 322 323 /* 324 * kgdb_arch_init - Perform any architecture specific initialization. 325 * This function will handle the initialization of any architecture 326 * specific callbacks. 327 */ 328 int kgdb_arch_init(void) 329 { 330 int ret = register_die_notifier(&kgdb_notifier); 331 332 if (ret != 0) 333 return ret; 334 335 register_break_hook(&kgdb_brkpt_hook); 336 register_break_hook(&kgdb_compiled_brkpt_hook); 337 register_step_hook(&kgdb_step_hook); 338 return 0; 339 } 340 341 /* 342 * kgdb_arch_exit - Perform any architecture specific uninitalization. 343 * This function will handle the uninitalization of any architecture 344 * specific callbacks, for dynamic registration and unregistration. 345 */ 346 void kgdb_arch_exit(void) 347 { 348 unregister_break_hook(&kgdb_brkpt_hook); 349 unregister_break_hook(&kgdb_compiled_brkpt_hook); 350 unregister_step_hook(&kgdb_step_hook); 351 unregister_die_notifier(&kgdb_notifier); 352 } 353 354 const struct kgdb_arch arch_kgdb_ops; 355 356 int kgdb_arch_set_breakpoint(struct kgdb_bkpt *bpt) 357 { 358 int err; 359 360 BUILD_BUG_ON(AARCH64_INSN_SIZE != BREAK_INSTR_SIZE); 361 362 err = aarch64_insn_read((void *)bpt->bpt_addr, (u32 *)bpt->saved_instr); 363 if (err) 364 return err; 365 366 return aarch64_insn_write((void *)bpt->bpt_addr, 367 (u32)AARCH64_BREAK_KGDB_DYN_DBG); 368 } 369 370 int kgdb_arch_remove_breakpoint(struct kgdb_bkpt *bpt) 371 { 372 return aarch64_insn_write((void *)bpt->bpt_addr, 373 *(u32 *)bpt->saved_instr); 374 } 375