[patch 00/11] Hardware Breakpoint interfaces

From: prasad
Date: Wed Mar 04 2009 - 23:37:46 EST


Hi Ingo,
Please find the revised set of patches that implement Hardware
Breakpoint (or watchpoint) registers and an arch-specific implementation
for x86/x86_64.

Changelog
---------
The previous version of these patches were submitted through
http://article.gmane.org/gmane.linux.kernel/794870. The patches now
contain a new ftrace plugin for kernel symbol tracing using hardware
breakpoint registers. The patches are now re-based to -tip tree commit
e40aa382597b30c4d702951348500e812b4cb3d0.

A small usage note on the plugin along with the description of the
breakpoint interfaces is included below.

Kindly accept these patches to become a part of -tip tree.

Description
-------------
The Hardware Breakpoint registers can be used for tracing changes to a
variable or data location (even I/O ports in x86/x86_64) and will be
extremely helpful in debugging problems such as memory corruption. While
these registers have been used by user-space debuggers for long (through
'ptrace' syscalls), Kgdb exploited them for kernel-space addresses.

The proposed framework, introduces interfaces to use them directly on
both user- and kernel-space addresses apart from arbitrating requests
from various such users for the limited number of registers.

The interfaces are:

int register_kernel_hw_breakpoint(struct hw_breakpoint *);
void unregister_kernel_hw_breakpoint(struct hw_breakpoint *bp);

int register_user_hw_breakpoint(struct task_struct *tsk,
struct hw_breakpoint *bp);
void unregister_user_hw_breakpoint(struct task_struct *tsk,
struct hw_breakpoint *bp);

The 'struct hw_breakpoint' will be the anchor data-structure containing
all the necessary information such as name or address, type, length,
priority and pointers to handler functions (some of which are
arch-specific). More information about the role of each field, the
handler
functions and their return values can be found in the descriptive
comments
preceding these functions and in "include/asm-generic/hw_breakpoint.h".

While (un)register_user_hw_breakpoint() isn't exported yet, its
worker-routine __register_user-hw_breakpoint() is used by ptrace syscall
for all breakpoint register requirements. For the kernel-space, a simple
use case to trace 'write' operations on a kernel variable can be found
in samples/hw_breakpoint/data_breakpoint.c.

In the current patchset, support is provided only for read and
read-write breakpoints on data locations, which can be later expand to
include instruction and I/O breakpoints for x86/x86_64.

There is pending integration with 'KGDB' without which mutual exclusion
between them (KGDB and HW breakpoint use through above interfaces) needs
to be observed.

Ftrace plugin
-------------
Usage
------
mount -t debugfs debugfs /debug
cd /debug/tracing/
echo 0 > tracing_enabled
cat available_tracers
echo ksym_tracer > current_tracer
echo "pid_max:rw-" > ksym_trace_filter
echo "jiffies:-w-" > ksym_trace_filter

echo 1 > tracing_enabled

cat trace


Sample Output (snipped)
-------------

[root@mymachine tracing]# cat trace
# tracer: ksym_tracer
#
# TASK-PID CPU# Symbol Type Function
# | | | | |
atieventsd 3053 1 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5394 1 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5394 0 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5394 0 pid_max RW alloc_pid+0x6c/0x2fd
bash 4898 1 pid_max RW alloc_pid+0x6c/0x2fd
atieventsd 3053 1 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5401 1 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5413 0 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5415 0 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5415 0 pid_max RW alloc_pid+0x6c/0x2fd
authatieventsd. 5413 0 pid_max RW alloc_pid+0x6c/0x2fd
hald-runner 2766 0 pid_max RW alloc_pid+0x6c/0x2fd
hal-system-kill 5425 1 pid_max RW alloc_pid+0x6c/0x2fd
hal-system-kill 5425 1 pid_max RW alloc_pid+0x6c/0x2fd
swapper 0 0 jiffies W do_timer+0x16/0xb0
swapper 0 0 jiffies W do_timer+0x16/0xb0
gnome-terminal 4521 0 jiffies W do_timer+0x16/0xb0
Xorg 3235 0 jiffies W do_timer+0x16/0xb0
Xorg 3235 0 jiffies W do_timer+0x16/0xb0
[root@mymachine tracing]#

Thanks,
K.Prasad

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/