Message ID | 87pp4asm6u.fsf@linaro.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Hi Alex, On Thu, Jul 02, 2015 at 02:50:33PM +0100, Alex Bennée wrote: > Are you happy with this?: [...] > +/** > + * kvm_arch_dev_ioctl_check_extension > + * > + * We currently assume that the number of HW registers is uniform > + * across all CPUs (see cpuinfo_sanity_check). > + */ > int kvm_arch_dev_ioctl_check_extension(long ext) > { > int r; > @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) > case KVM_CAP_ARM_EL1_32BIT: > r = cpu_has_32bit_el1(); > break; > + case KVM_CAP_GUEST_DEBUG_HW_BPS: > + r = hw_breakpoint_slots(TYPE_INST); > + break; > + case KVM_CAP_GUEST_DEBUG_HW_WPS: > + r = hw_breakpoint_slots(TYPE_DATA); > + break; Whilst I much prefer this code, it actually adds an unwanted dependency on PERF_EVENTS that I didn't think about to start with. Sorry to keep messing you about -- I guess your original patch is the best thing after all. Will
Will Deacon <will.deacon@arm.com> writes: > Hi Alex, > > On Thu, Jul 02, 2015 at 02:50:33PM +0100, Alex Bennée wrote: >> Are you happy with this?: > > [...] > >> +/** >> + * kvm_arch_dev_ioctl_check_extension >> + * >> + * We currently assume that the number of HW registers is uniform >> + * across all CPUs (see cpuinfo_sanity_check). >> + */ >> int kvm_arch_dev_ioctl_check_extension(long ext) >> { >> int r; >> @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) >> case KVM_CAP_ARM_EL1_32BIT: >> r = cpu_has_32bit_el1(); >> break; >> + case KVM_CAP_GUEST_DEBUG_HW_BPS: >> + r = hw_breakpoint_slots(TYPE_INST); >> + break; >> + case KVM_CAP_GUEST_DEBUG_HW_WPS: >> + r = hw_breakpoint_slots(TYPE_DATA); >> + break; > > Whilst I much prefer this code, it actually adds an unwanted dependency > on PERF_EVENTS that I didn't think about to start with. Sorry to keep > messing you about -- I guess your original patch is the best thing after > all. Everything looks to be in hw_breakpoint.[ch] which does depend on CONFIG_HAVE_HW_BREAKPOINT which depends on PERF_EVENTS to be built. However the previous code depended on this behaviour as well. It would seem weird to enable guest debug using HW debug registers to debug the guest yet not allowing the host kernel to use them? Of course this is the only code they would share as all the magic of guest debugging is already mostly there for dirty guest handling. I'm not familiar with Kconfig but it looks like this is all part of arm64 defconfig. Are people really going to want to disable PERF_EVENTS but still debug their guests with HW support? > > Will
On Fri, Jul 03, 2015 at 05:07:41PM +0100, Alex Bennée wrote: > Will Deacon <will.deacon@arm.com> writes: > > On Thu, Jul 02, 2015 at 02:50:33PM +0100, Alex Bennée wrote: > >> Are you happy with this?: > > > > [...] > > > >> +/** > >> + * kvm_arch_dev_ioctl_check_extension > >> + * > >> + * We currently assume that the number of HW registers is uniform > >> + * across all CPUs (see cpuinfo_sanity_check). > >> + */ > >> int kvm_arch_dev_ioctl_check_extension(long ext) > >> { > >> int r; > >> @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) > >> case KVM_CAP_ARM_EL1_32BIT: > >> r = cpu_has_32bit_el1(); > >> break; > >> + case KVM_CAP_GUEST_DEBUG_HW_BPS: > >> + r = hw_breakpoint_slots(TYPE_INST); > >> + break; > >> + case KVM_CAP_GUEST_DEBUG_HW_WPS: > >> + r = hw_breakpoint_slots(TYPE_DATA); > >> + break; > > > > Whilst I much prefer this code, it actually adds an unwanted dependency > > on PERF_EVENTS that I didn't think about to start with. Sorry to keep > > messing you about -- I guess your original patch is the best thing after > > all. > > Everything looks to be in hw_breakpoint.[ch] which does depend on > CONFIG_HAVE_HW_BREAKPOINT which depends on PERF_EVENTS to be built. > However the previous code depended on this behaviour as well. I think your original approach (of sticking stuff in the header file) works regardless of the CONFIG option, no? > It would seem weird to enable guest debug using HW debug registers to > debug the guest yet not allowing the host kernel to use them? Of course > this is the only code they would share as all the magic of guest > debugging is already mostly there for dirty guest handling. > > I'm not familiar with Kconfig but it looks like this is all part of > arm64 defconfig. Are people really going to want to disable PERF_EVENTS > but still debug their guests with HW support? Then it's your call. I just find the host dependency on perf a bit weird to get guest debug working (especially as the dependency is completely "fake" because we don't use any perf infrastructure at all). Will
Will Deacon <will.deacon@arm.com> writes: > On Fri, Jul 03, 2015 at 05:07:41PM +0100, Alex Bennée wrote: >> Will Deacon <will.deacon@arm.com> writes: >> > On Thu, Jul 02, 2015 at 02:50:33PM +0100, Alex Bennée wrote: >> >> Are you happy with this?: >> > >> > [...] >> > >> >> +/** >> >> + * kvm_arch_dev_ioctl_check_extension >> >> + * >> >> + * We currently assume that the number of HW registers is uniform >> >> + * across all CPUs (see cpuinfo_sanity_check). >> >> + */ >> >> int kvm_arch_dev_ioctl_check_extension(long ext) >> >> { >> >> int r; >> >> @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) >> >> case KVM_CAP_ARM_EL1_32BIT: >> >> r = cpu_has_32bit_el1(); >> >> break; >> >> + case KVM_CAP_GUEST_DEBUG_HW_BPS: >> >> + r = hw_breakpoint_slots(TYPE_INST); >> >> + break; >> >> + case KVM_CAP_GUEST_DEBUG_HW_WPS: >> >> + r = hw_breakpoint_slots(TYPE_DATA); >> >> + break; >> > >> > Whilst I much prefer this code, it actually adds an unwanted dependency >> > on PERF_EVENTS that I didn't think about to start with. Sorry to keep >> > messing you about -- I guess your original patch is the best thing after >> > all. >> >> Everything looks to be in hw_breakpoint.[ch] which does depend on >> CONFIG_HAVE_HW_BREAKPOINT which depends on PERF_EVENTS to be built. >> However the previous code depended on this behaviour as well. > > I think your original approach (of sticking stuff in the header file) works > regardless of the CONFIG option, no? Ahh yeah I reverted that to an extern due to random compile breakage: http://storage.kernelci.org/alex/v4.1-12-gd38574dba3ec/arm64-allmodconfig/build.log I'll see if I can fix that up. >> It would seem weird to enable guest debug using HW debug registers to >> debug the guest yet not allowing the host kernel to use them? Of course >> this is the only code they would share as all the magic of guest >> debugging is already mostly there for dirty guest handling. >> >> I'm not familiar with Kconfig but it looks like this is all part of >> arm64 defconfig. Are people really going to want to disable PERF_EVENTS >> but still debug their guests with HW support? > > Then it's your call. I just find the host dependency on perf a bit weird > to get guest debug working (especially as the dependency is completely > "fake" because we don't use any perf infrastructure at all). > > Will
On Mon, Jul 06, 2015 at 09:51:40AM +0100, Will Deacon wrote: > On Fri, Jul 03, 2015 at 05:07:41PM +0100, Alex Bennée wrote: > > Will Deacon <will.deacon@arm.com> writes: > > > On Thu, Jul 02, 2015 at 02:50:33PM +0100, Alex Bennée wrote: > > >> Are you happy with this?: > > > > > > [...] > > > > > >> +/** > > >> + * kvm_arch_dev_ioctl_check_extension > > >> + * > > >> + * We currently assume that the number of HW registers is uniform > > >> + * across all CPUs (see cpuinfo_sanity_check). > > >> + */ > > >> int kvm_arch_dev_ioctl_check_extension(long ext) > > >> { > > >> int r; > > >> @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) > > >> case KVM_CAP_ARM_EL1_32BIT: > > >> r = cpu_has_32bit_el1(); > > >> break; > > >> + case KVM_CAP_GUEST_DEBUG_HW_BPS: > > >> + r = hw_breakpoint_slots(TYPE_INST); > > >> + break; > > >> + case KVM_CAP_GUEST_DEBUG_HW_WPS: > > >> + r = hw_breakpoint_slots(TYPE_DATA); > > >> + break; > > > > > > Whilst I much prefer this code, it actually adds an unwanted dependency > > > on PERF_EVENTS that I didn't think about to start with. Sorry to keep > > > messing you about -- I guess your original patch is the best thing after > > > all. > > > > Everything looks to be in hw_breakpoint.[ch] which does depend on > > CONFIG_HAVE_HW_BREAKPOINT which depends on PERF_EVENTS to be built. > > However the previous code depended on this behaviour as well. > > I think your original approach (of sticking stuff in the header file) works > regardless of the CONFIG option, no? > > > It would seem weird to enable guest debug using HW debug registers to > > debug the guest yet not allowing the host kernel to use them? Of course > > this is the only code they would share as all the magic of guest > > debugging is already mostly there for dirty guest handling. > > > > I'm not familiar with Kconfig but it looks like this is all part of > > arm64 defconfig. Are people really going to want to disable PERF_EVENTS > > but still debug their guests with HW support? > > Then it's your call. I just find the host dependency on perf a bit weird > to get guest debug working (especially as the dependency is completely > "fake" because we don't use any perf infrastructure at all). > Agreed, let's see if we can avoid this. Thanks, -Christoffer
diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt index 33c8143..ada57df 100644 --- a/Documentation/virtual/kvm/api.txt +++ b/Documentation/virtual/kvm/api.txt @@ -2668,7 +2668,7 @@ The top 16 bits of the control field are architecture specific control flags which can include the following: - KVM_GUESTDBG_USE_SW_BP: using software breakpoints [x86, arm64] - - KVM_GUESTDBG_USE_HW_BP: using hardware breakpoints [x86, s390] + - KVM_GUESTDBG_USE_HW_BP: using hardware breakpoints [x86, s390, arm64] - KVM_GUESTDBG_INJECT_DB: inject DB type exception [x86] - KVM_GUESTDBG_INJECT_BP: inject BP type exception [x86] - KVM_GUESTDBG_EXIT_PENDING: trigger an immediate guest exit [s390] @@ -2683,6 +2683,11 @@ updated to the correct (supplied) values. The second part of the structure is architecture specific and typically contains a set of debug registers. +For arm64 the number of debug registers is implementation defined and +can be determined by querying the KVM_CAP_GUEST_DEBUG_HW_BPS and +KVM_CAP_GUEST_DEBUG_HW_WPS capabilities which return a positive number +indicating the number of supported registers. + When debug events exit the main run loop with the reason KVM_EXIT_DEBUG with the kvm_debug_exit_arch part of the kvm_run structure containing architecture specific debug information. diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h index 461d288..6c745e0 100644 --- a/arch/arm64/include/asm/kvm_host.h +++ b/arch/arm64/include/asm/kvm_host.h @@ -116,13 +116,17 @@ struct kvm_vcpu_arch { * debugging the guest from the host and to maintain separate host and * guest state during world switches. vcpu_debug_state are the debug * registers of the vcpu as the guest sees them. host_debug_state are - * the host registers which are saved and restored during world switches. + * the host registers which are saved and restored during + * world switches. external_debug_state contains the debug + * values we want to debug the guest. This is set via the + * KVM_SET_GUEST_DEBUG ioctl. * * debug_ptr points to the set of debug registers that should be loaded * onto the hardware when running the guest. */ struct kvm_guest_debug_arch *debug_ptr; struct kvm_guest_debug_arch vcpu_debug_state; + struct kvm_guest_debug_arch external_debug_state; /* Pointer to host CPU context */ kvm_cpu_context_t *host_cpu_context; diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c index ffefb97..46b73d7 100644 --- a/arch/arm64/kvm/debug.c +++ b/arch/arm64/kvm/debug.c @@ -105,10 +105,6 @@ void kvm_arm_setup_debug(struct kvm_vcpu *vcpu) MDCR_EL2_TDRA | MDCR_EL2_TDOSA); - /* Trap on access to debug registers? */ - if (trap_debug) - vcpu->arch.mdcr_el2 |= MDCR_EL2_TDA; - /* Is Guest debugging in effect? */ if (vcpu->guest_debug) { /* Route all software debug exceptions to EL2 */ @@ -143,11 +139,45 @@ void kvm_arm_setup_debug(struct kvm_vcpu *vcpu) } else { vcpu_sys_reg(vcpu, MDSCR_EL1) &= ~DBG_MDSCR_SS; } + + /* + * HW Breakpoints and watchpoints + * + * We simply switch the debug_ptr to point to our new + * external_debug_state which has been populated by the + * debug ioctl. The existing KVM_ARM64_DEBUG_DIRTY + * mechanism ensures the registers are updated on the + * world switch. + */ + if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW) { + /* Enable breakpoints/watchpoints */ + vcpu_sys_reg(vcpu, MDSCR_EL1) |= DBG_MDSCR_MDE; + + vcpu->arch.debug_ptr = &vcpu->arch.external_debug_state; + vcpu->arch.debug_flags |= KVM_ARM64_DEBUG_DIRTY; + trap_debug = true; + } } + + BUG_ON(!vcpu->guest_debug && + vcpu->arch.debug_ptr != &vcpu->arch.vcpu_debug_state); + + /* Trap debug register access */ + if (trap_debug) + vcpu->arch.mdcr_el2 |= MDCR_EL2_TDA; } void kvm_arm_clear_debug(struct kvm_vcpu *vcpu) { - if (vcpu->guest_debug) + if (vcpu->guest_debug) { restore_guest_debug_regs(vcpu); + + /* + * If we were using HW debug we need to restore the + * debug_ptr to the guest debug state. + */ + if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW) + kvm_arm_reset_debug_ptr(vcpu); + + } } diff --git a/arch/arm64/kvm/guest.c b/arch/arm64/kvm/guest.c index 48de4f4..6f1b249 100644 --- a/arch/arm64/kvm/guest.c +++ b/arch/arm64/kvm/guest.c @@ -334,6 +334,7 @@ int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, #define KVM_GUESTDBG_VALID_MASK (KVM_GUESTDBG_ENABLE | \ KVM_GUESTDBG_USE_SW_BP | \ + KVM_GUESTDBG_USE_HW | \ KVM_GUESTDBG_SINGLESTEP) /** @@ -354,6 +355,12 @@ int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, if (dbg->control & KVM_GUESTDBG_ENABLE) { vcpu->guest_debug = dbg->control; + + /* Hardware assisted Break and Watch points */ + if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW) { + vcpu->arch.external_debug_state = dbg->arch; + } + } else { /* If not enabled clear all flags */ vcpu->guest_debug = 0; diff --git a/arch/arm64/kvm/handle_exit.c b/arch/arm64/kvm/handle_exit.c index e9de13e..68a0759 100644 --- a/arch/arm64/kvm/handle_exit.c +++ b/arch/arm64/kvm/handle_exit.c @@ -103,7 +103,11 @@ static int kvm_handle_guest_debug(struct kvm_vcpu *vcpu, struct kvm_run *run) run->debug.arch.hsr = hsr; switch (hsr >> ESR_ELx_EC_SHIFT) { + case ESR_ELx_EC_WATCHPT_LOW: + run->debug.arch.far = vcpu->arch.fault.far_el2; + /* fall through */ case ESR_ELx_EC_SOFTSTP_LOW: + case ESR_ELx_EC_BREAKPT_LOW: case ESR_ELx_EC_BKPT32: case ESR_ELx_EC_BRK64: break; @@ -132,6 +136,8 @@ static exit_handle_fn arm_exit_handlers[] = { [ESR_ELx_EC_IABT_LOW] = kvm_handle_guest_abort, [ESR_ELx_EC_DABT_LOW] = kvm_handle_guest_abort, [ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug, + [ESR_ELx_EC_WATCHPT_LOW]= kvm_handle_guest_debug, + [ESR_ELx_EC_BREAKPT_LOW]= kvm_handle_guest_debug, [ESR_ELx_EC_BKPT32] = kvm_handle_guest_debug, [ESR_ELx_EC_BRK64] = kvm_handle_guest_debug, }; diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c index 0b43265..5a954c4 100644 --- a/arch/arm64/kvm/reset.c +++ b/arch/arm64/kvm/reset.c @@ -22,6 +22,7 @@ #include <linux/errno.h> #include <linux/kvm_host.h> #include <linux/kvm.h> +#include <linux/hw_breakpoint.h> #include <kvm/arm_arch_timer.h> @@ -56,6 +57,12 @@ static bool cpu_has_32bit_el1(void) return !!(pfr0 & 0x20); } +/** + * kvm_arch_dev_ioctl_check_extension + * + * We currently assume that the number of HW registers is uniform + * across all CPUs (see cpuinfo_sanity_check). + */ int kvm_arch_dev_ioctl_check_extension(long ext) { int r; @@ -64,6 +71,12 @@ int kvm_arch_dev_ioctl_check_extension(long ext) case KVM_CAP_ARM_EL1_32BIT: r = cpu_has_32bit_el1(); break; + case KVM_CAP_GUEST_DEBUG_HW_BPS: + r = hw_breakpoint_slots(TYPE_INST); + break; + case KVM_CAP_GUEST_DEBUG_HW_WPS: + r = hw_breakpoint_slots(TYPE_DATA); + break; default: r = 0; } diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c index 3267b96..f753a67 100644 --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -362,9 +362,6 @@ static inline bool trap_wcr(struct kvm_vcpu *vcpu, vcpu->arch.vcpu_debug_state.dbg_wcr[rd->reg]); } - trace_trap_reg(__func__, rd->reg, p->is_write, - vcpu->arch.vcpu_debug_state.dbg_wcr[rd->reg]); - return true; } diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 70ac641..f020dd0 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -817,6 +817,8 @@ struct kvm_ppc_smmu_info { #define KVM_CAP_S390_INJECT_IRQ 113 #define KVM_CAP_S390_IRQ_STATE 114 #define KVM_CAP_PPC_HWRNG 115 +#define KVM_CAP_GUEST_DEBUG_HW_BPS 116 +#define KVM_CAP_GUEST_DEBUG_HW_WPS 117 #ifdef KVM_CAP_IRQ_ROUTING