2019-05-27 14:55:05 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2009-06-02 02:16:20 +08:00
|
|
|
/*
|
|
|
|
* data_breakpoint.c - Sample HW Breakpoint file to watch kernel data address
|
|
|
|
*
|
|
|
|
* usage: insmod data_breakpoint.ko ksym=<ksym_name>
|
|
|
|
*
|
|
|
|
* This file is a kernel module that places a breakpoint over ksym_name kernel
|
|
|
|
* variable using Hardware Breakpoint register. The corresponding handler which
|
2011-03-31 09:57:33 +08:00
|
|
|
* prints a backtrace is invoked every time a write operation is performed on
|
2009-06-02 02:16:20 +08:00
|
|
|
* that variable.
|
|
|
|
*
|
|
|
|
* Copyright (C) IBM Corporation, 2009
|
2009-11-23 23:47:13 +08:00
|
|
|
*
|
|
|
|
* Author: K.Prasad <prasad@linux.vnet.ibm.com>
|
2009-06-02 02:16:20 +08:00
|
|
|
*/
|
|
|
|
#include <linux/module.h> /* Needed by all modules */
|
|
|
|
#include <linux/kernel.h> /* Needed for KERN_INFO */
|
|
|
|
#include <linux/init.h> /* Needed for the macros */
|
2009-11-10 17:17:07 +08:00
|
|
|
#include <linux/kallsyms.h>
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2009-11-10 17:17:07 +08:00
|
|
|
#include <linux/perf_event.h>
|
|
|
|
#include <linux/hw_breakpoint.h>
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2010-02-17 09:50:50 +08:00
|
|
|
struct perf_event * __percpu *sample_hbp;
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2020-04-07 11:11:39 +08:00
|
|
|
static char ksym_name[KSYM_NAME_LEN] = "jiffies";
|
2009-06-02 02:16:20 +08:00
|
|
|
module_param_string(ksym, ksym_name, KSYM_NAME_LEN, S_IRUGO);
|
|
|
|
MODULE_PARM_DESC(ksym, "Kernel symbol to monitor; this module will report any"
|
|
|
|
" write operations on the kernel symbol");
|
|
|
|
|
2011-06-27 20:41:57 +08:00
|
|
|
static void sample_hbp_handler(struct perf_event *bp,
|
2009-12-05 16:44:31 +08:00
|
|
|
struct perf_sample_data *data,
|
|
|
|
struct pt_regs *regs)
|
2009-06-02 02:16:20 +08:00
|
|
|
{
|
|
|
|
printk(KERN_INFO "%s value is changed\n", ksym_name);
|
|
|
|
dump_stack();
|
|
|
|
printk(KERN_INFO "Dump stack from sample_hbp_handler\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __init hw_break_module_init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
2009-12-05 16:44:31 +08:00
|
|
|
struct perf_event_attr attr;
|
2020-04-07 11:11:39 +08:00
|
|
|
void *addr = __symbol_get(ksym_name);
|
|
|
|
|
|
|
|
if (!addr)
|
|
|
|
return -ENXIO;
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2009-12-05 16:44:31 +08:00
|
|
|
hw_breakpoint_init(&attr);
|
2020-04-07 11:11:39 +08:00
|
|
|
attr.bp_addr = (unsigned long)addr;
|
2009-11-27 11:55:54 +08:00
|
|
|
attr.bp_len = HW_BREAKPOINT_LEN_4;
|
samples/hw_breakpoint: drop HW_BREAKPOINT_R when reporting writes
Patch series "Unexport kallsyms_lookup_name() and kallsyms_on_each_symbol()".
Despite having just a single modular in-tree user that I could spot,
kallsyms_lookup_name() is exported to modules and provides a mechanism
for out-of-tree modules to access and invoke arbitrary, non-exported
kernel symbols when kallsyms is enabled.
This patch series fixes up that one user and unexports the symbol along
with kallsyms_on_each_symbol(), since that could also be abused in a
similar manner.
I would like to avoid out-of-tree modules being easily able to call
functions that are not exported. kallsyms_lookup_name() makes this
trivial to the point that there is very little incentive to rework these
modules to either use upstream interfaces correctly or propose
functionality which may be otherwise missing upstream. Both of these
latter solutions would be pre-requisites to upstreaming these modules, and
the current state of things actively discourages that approach.
The background here is that we are aiming for Android devices to be able
to use a generic binary kernel image closely following upstream, with any
vendor extensions coming in as kernel modules. In this case, we (Google)
end up maintaining the binary module ABI within the scope of a single LTS
kernel. Monitoring and managing the ABI surface is not feasible if it
effectively includes all data and functions via kallsyms_lookup_name().
Of course, we could just carry this patch in the Android kernel tree, but
we're aiming to carry as little as possible (ideally nothing) and I think
it's a sensible change in its own right. I'm surprised you object to it,
in all honesty.
Now, you could turn around and say "that's not upstream's problem", but it
still seems highly undesirable to me to have an upstream bypass for
exported symbols that isn't even used by upstream modules. It's ripe for
abuse and encourages people to work outside of the upstream tree. The
usual rule is that we don't export symbols without a user in the tree and
that seems especially relevant in this case.
Joe Lawrence said:
: FWIW, kallsyms was historically used by the out-of-tree kpatch support
: module to resolve external symbols as well as call set_memory_r{w,o}()
: API. All of that support code has been merged upstream, so modern kpatch
: modules* no longer leverage kallsyms by default.
:
: That said, there are still some users who still use the deprecated support
: module with newer kernels, but that is not officially supported by the
: project.
This patch (of 3):
Given the name of a kernel symbol, the 'data_breakpoint' test claims to
"report any write operations on the kernel symbol". However, it creates
the breakpoint using both HW_BREAKPOINT_W and HW_BREAKPOINT_R, which menas
it also fires for read access.
Drop HW_BREAKPOINT_R from the breakpoint attributes.
Signed-off-by: Will Deacon <will@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Masami Hiramatsu <mhiramat@kernel.org>
Reviewed-by: Quentin Perret <qperret@google.com>
Cc: K.Prasad <prasad@linux.vnet.ibm.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Frederic Weisbecker <frederic@kernel.org>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Miroslav Benes <mbenes@suse.cz>
Cc: Petr Mladek <pmladek@suse.com>
Cc: Joe Lawrence <joe.lawrence@redhat.com>
Link: http://lkml.kernel.org/r/20200221114404.14641-2-will@kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2020-04-07 11:11:36 +08:00
|
|
|
attr.bp_type = HW_BREAKPOINT_W;
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2011-06-29 23:42:35 +08:00
|
|
|
sample_hbp = register_wide_hw_breakpoint(&attr, sample_hbp_handler, NULL);
|
2010-02-17 09:50:50 +08:00
|
|
|
if (IS_ERR((void __force *)sample_hbp)) {
|
|
|
|
ret = PTR_ERR((void __force *)sample_hbp);
|
2009-11-10 17:17:07 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
2009-06-02 02:16:20 +08:00
|
|
|
|
2009-11-10 17:17:07 +08:00
|
|
|
printk(KERN_INFO "HW Breakpoint for %s write installed\n", ksym_name);
|
2009-06-02 02:16:20 +08:00
|
|
|
|
|
|
|
return 0;
|
2009-11-10 17:17:07 +08:00
|
|
|
|
|
|
|
fail:
|
|
|
|
printk(KERN_INFO "Breakpoint registration failed\n");
|
|
|
|
|
|
|
|
return ret;
|
2009-06-02 02:16:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit hw_break_module_exit(void)
|
|
|
|
{
|
2009-11-10 17:17:07 +08:00
|
|
|
unregister_wide_hw_breakpoint(sample_hbp);
|
2020-04-07 11:11:39 +08:00
|
|
|
symbol_put(ksym_name);
|
2009-06-02 02:16:20 +08:00
|
|
|
printk(KERN_INFO "HW Breakpoint for %s write uninstalled\n", ksym_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(hw_break_module_init);
|
|
|
|
module_exit(hw_break_module_exit);
|
|
|
|
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_AUTHOR("K.Prasad");
|
|
|
|
MODULE_DESCRIPTION("ksym breakpoint");
|