Commit a0baf043 authored by Frederic Weisbecker's avatar Frederic Weisbecker Committed by Ingo Molnar

perf/arch/x86: Implement hw_breakpoint_arch_parse()

Migrate to the new API in order to remove arch_validate_hwbkpt_settings()
that clumsily mixes up architecture validation and commit.
Original-patch-by: default avatarAndy Lutomirski <luto@kernel.org>
Signed-off-by: default avatarFrederic Weisbecker <frederic@kernel.org>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>
Cc: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Chris Zankel <chris@zankel.net>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Joel Fernandes <joel.opensrc@gmail.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Max Filippov <jcmvbkbc@gmail.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rich Felker <dalias@libc.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Will Deacon <will.deacon@arm.com>
Cc: Yoshinori Sato <ysato@users.sourceforge.jp>
Link: http://lkml.kernel.org/r/1529981939-8231-4-git-send-email-frederic@kernel.orgSigned-off-by: default avatarIngo Molnar <mingo@kernel.org>
parent 8e983ff9
...@@ -49,11 +49,15 @@ static inline int hw_breakpoint_slots(int type) ...@@ -49,11 +49,15 @@ static inline int hw_breakpoint_slots(int type)
return HBP_NUM; return HBP_NUM;
} }
struct perf_event_attr;
struct perf_event; struct perf_event;
struct pmu; struct pmu;
extern int arch_check_bp_in_kernelspace(struct arch_hw_breakpoint *hw); extern int arch_check_bp_in_kernelspace(struct arch_hw_breakpoint *hw);
extern int arch_validate_hwbkpt_settings(struct perf_event *bp); extern int hw_breakpoint_arch_parse(struct perf_event *bp,
const struct perf_event_attr *attr,
struct arch_hw_breakpoint *hw);
#define hw_breakpoint_arch_parse hw_breakpoint_arch_parse
extern int hw_breakpoint_exceptions_notify(struct notifier_block *unused, extern int hw_breakpoint_exceptions_notify(struct notifier_block *unused,
unsigned long val, void *data); unsigned long val, void *data);
......
...@@ -239,19 +239,20 @@ int arch_check_bp_in_kernelspace(struct arch_hw_breakpoint *hw) ...@@ -239,19 +239,20 @@ int arch_check_bp_in_kernelspace(struct arch_hw_breakpoint *hw)
return (va >= TASK_SIZE_MAX) || ((va + len - 1) >= TASK_SIZE_MAX); return (va >= TASK_SIZE_MAX) || ((va + len - 1) >= TASK_SIZE_MAX);
} }
static int arch_build_bp_info(struct perf_event *bp) static int arch_build_bp_info(struct perf_event *bp,
const struct perf_event_attr *attr,
struct arch_hw_breakpoint *hw)
{ {
struct arch_hw_breakpoint *info = counter_arch_bp(bp); hw->address = attr->bp_addr;
hw->mask = 0;
info->address = bp->attr.bp_addr;
/* Type */ /* Type */
switch (bp->attr.bp_type) { switch (attr->bp_type) {
case HW_BREAKPOINT_W: case HW_BREAKPOINT_W:
info->type = X86_BREAKPOINT_WRITE; hw->type = X86_BREAKPOINT_WRITE;
break; break;
case HW_BREAKPOINT_W | HW_BREAKPOINT_R: case HW_BREAKPOINT_W | HW_BREAKPOINT_R:
info->type = X86_BREAKPOINT_RW; hw->type = X86_BREAKPOINT_RW;
break; break;
case HW_BREAKPOINT_X: case HW_BREAKPOINT_X:
/* /*
...@@ -259,23 +260,23 @@ static int arch_build_bp_info(struct perf_event *bp) ...@@ -259,23 +260,23 @@ static int arch_build_bp_info(struct perf_event *bp)
* acceptable for kprobes. On non-kprobes kernels, we don't * acceptable for kprobes. On non-kprobes kernels, we don't
* allow kernel breakpoints at all. * allow kernel breakpoints at all.
*/ */
if (bp->attr.bp_addr >= TASK_SIZE_MAX) { if (attr->bp_addr >= TASK_SIZE_MAX) {
#ifdef CONFIG_KPROBES #ifdef CONFIG_KPROBES
if (within_kprobe_blacklist(bp->attr.bp_addr)) if (within_kprobe_blacklist(attr->bp_addr))
return -EINVAL; return -EINVAL;
#else #else
return -EINVAL; return -EINVAL;
#endif #endif
} }
info->type = X86_BREAKPOINT_EXECUTE; hw->type = X86_BREAKPOINT_EXECUTE;
/* /*
* x86 inst breakpoints need to have a specific undefined len. * x86 inst breakpoints need to have a specific undefined len.
* But we still need to check userspace is not trying to setup * But we still need to check userspace is not trying to setup
* an unsupported length, to get a range breakpoint for example. * an unsupported length, to get a range breakpoint for example.
*/ */
if (bp->attr.bp_len == sizeof(long)) { if (attr->bp_len == sizeof(long)) {
info->len = X86_BREAKPOINT_LEN_X; hw->len = X86_BREAKPOINT_LEN_X;
return 0; return 0;
} }
default: default:
...@@ -283,28 +284,26 @@ static int arch_build_bp_info(struct perf_event *bp) ...@@ -283,28 +284,26 @@ static int arch_build_bp_info(struct perf_event *bp)
} }
/* Len */ /* Len */
info->mask = 0; switch (attr->bp_len) {
switch (bp->attr.bp_len) {
case HW_BREAKPOINT_LEN_1: case HW_BREAKPOINT_LEN_1:
info->len = X86_BREAKPOINT_LEN_1; hw->len = X86_BREAKPOINT_LEN_1;
break; break;
case HW_BREAKPOINT_LEN_2: case HW_BREAKPOINT_LEN_2:
info->len = X86_BREAKPOINT_LEN_2; hw->len = X86_BREAKPOINT_LEN_2;
break; break;
case HW_BREAKPOINT_LEN_4: case HW_BREAKPOINT_LEN_4:
info->len = X86_BREAKPOINT_LEN_4; hw->len = X86_BREAKPOINT_LEN_4;
break; break;
#ifdef CONFIG_X86_64 #ifdef CONFIG_X86_64
case HW_BREAKPOINT_LEN_8: case HW_BREAKPOINT_LEN_8:
info->len = X86_BREAKPOINT_LEN_8; hw->len = X86_BREAKPOINT_LEN_8;
break; break;
#endif #endif
default: default:
/* AMD range breakpoint */ /* AMD range breakpoint */
if (!is_power_of_2(bp->attr.bp_len)) if (!is_power_of_2(attr->bp_len))
return -EINVAL; return -EINVAL;
if (bp->attr.bp_addr & (bp->attr.bp_len - 1)) if (attr->bp_addr & (attr->bp_len - 1))
return -EINVAL; return -EINVAL;
if (!boot_cpu_has(X86_FEATURE_BPEXT)) if (!boot_cpu_has(X86_FEATURE_BPEXT))
...@@ -317,8 +316,8 @@ static int arch_build_bp_info(struct perf_event *bp) ...@@ -317,8 +316,8 @@ static int arch_build_bp_info(struct perf_event *bp)
* breakpoints, then we'll have to check for kprobe-blacklisted * breakpoints, then we'll have to check for kprobe-blacklisted
* addresses anywhere in the range. * addresses anywhere in the range.
*/ */
info->mask = bp->attr.bp_len - 1; hw->mask = attr->bp_len - 1;
info->len = X86_BREAKPOINT_LEN_1; hw->len = X86_BREAKPOINT_LEN_1;
} }
return 0; return 0;
...@@ -327,22 +326,23 @@ static int arch_build_bp_info(struct perf_event *bp) ...@@ -327,22 +326,23 @@ static int arch_build_bp_info(struct perf_event *bp)
/* /*
* Validate the arch-specific HW Breakpoint register settings * Validate the arch-specific HW Breakpoint register settings
*/ */
int arch_validate_hwbkpt_settings(struct perf_event *bp) int hw_breakpoint_arch_parse(struct perf_event *bp,
const struct perf_event_attr *attr,
struct arch_hw_breakpoint *hw)
{ {
struct arch_hw_breakpoint *info = counter_arch_bp(bp);
unsigned int align; unsigned int align;
int ret; int ret;
ret = arch_build_bp_info(bp); ret = arch_build_bp_info(bp, attr, hw);
if (ret) if (ret)
return ret; return ret;
switch (info->len) { switch (hw->len) {
case X86_BREAKPOINT_LEN_1: case X86_BREAKPOINT_LEN_1:
align = 0; align = 0;
if (info->mask) if (hw->mask)
align = info->mask; align = hw->mask;
break; break;
case X86_BREAKPOINT_LEN_2: case X86_BREAKPOINT_LEN_2:
align = 1; align = 1;
...@@ -363,7 +363,7 @@ int arch_validate_hwbkpt_settings(struct perf_event *bp) ...@@ -363,7 +363,7 @@ int arch_validate_hwbkpt_settings(struct perf_event *bp)
* Check that the low-order bits of the address are appropriate * Check that the low-order bits of the address are appropriate
* for the alignment implied by len. * for the alignment implied by len.
*/ */
if (info->address & align) if (hw->address & align)
return -EINVAL; return -EINVAL;
return 0; return 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment