@@ -20,6 +20,13 @@ config CRASH_DEBUG
If you want to attach gdb to Xen to debug Xen if it crashes
then say Y.
+config GDBSX
+ bool "Guest debugging with gdbsx"
+ depends on X86
+ ---help---
+ If you want to enable support for debugging guests from dom0 via
+ gdbsx then say Y.
+
config DEBUG_INFO
bool "Compile Xen with debug info"
default y
@@ -19,7 +19,7 @@ obj-bin-y += copy_page.o
obj-y += cpuid.o
obj-$(CONFIG_PV) += compat.o x86_64/compat.o
obj-$(CONFIG_KEXEC) += crash.o
-obj-y += debug.o
+obj-$(CONFIG_GDBSX) += debug.o
obj-y += delay.o
obj-y += desc.o
obj-bin-y += dmi_scan.init.o
@@ -22,22 +22,6 @@
#include <asm/debugger.h>
#include <asm/p2m.h>
-/*
- * This file for general routines common to more than one debugger, like kdb,
- * gdbsx, etc..
- */
-
-#ifdef XEN_KDB_CONFIG
-#include "../kdb/include/kdbdefs.h"
-#include "../kdb/include/kdbproto.h"
-#define DBGP(...) {(kdbdbg) ? kdbp(__VA_ARGS__):0;}
-#define DBGP1(...) {(kdbdbg>1) ? kdbp(__VA_ARGS__):0;}
-#define DBGP2(...) {(kdbdbg>2) ? kdbp(__VA_ARGS__):0;}
-#else
-#define DBGP1(...) ((void)0)
-#define DBGP2(...) ((void)0)
-#endif
-
typedef unsigned long dbgva_t;
typedef unsigned char dbgbyte_t;
@@ -49,24 +33,13 @@ dbg_hvm_va2mfn(dbgva_t vaddr, struct domain *dp, int toaddr, gfn_t *gfn)
uint32_t pfec = PFEC_page_present;
p2m_type_t gfntype;
- DBGP2("vaddr:%lx domid:%d\n", vaddr, dp->domain_id);
-
*gfn = _gfn(paging_gva_to_gfn(dp->vcpu[0], vaddr, &pfec));
if ( gfn_eq(*gfn, INVALID_GFN) )
- {
- DBGP2("kdb:bad gfn from gva_to_gfn\n");
return INVALID_MFN;
- }
mfn = get_gfn(dp, gfn_x(*gfn), &gfntype);
if ( p2m_is_readonly(gfntype) && toaddr )
- {
- DBGP2("kdb:p2m_is_readonly: gfntype:%x\n", gfntype);
mfn = INVALID_MFN;
- }
- else
- DBGP2("X: vaddr:%lx domid:%d mfn:%#"PRI_mfn"\n",
- vaddr, dp->domain_id, mfn_x(mfn));
if ( mfn_eq(mfn, INVALID_MFN) )
{
@@ -100,55 +73,36 @@ dbg_pv_va2mfn(dbgva_t vaddr, struct domain *dp, uint64_t pgd3val)
unsigned long cr3 = (pgd3val ? pgd3val : dp->vcpu[0]->arch.cr3);
mfn_t mfn = maddr_to_mfn(cr3_pa(cr3));
- DBGP2("vaddr:%lx domid:%d cr3:%lx pgd3:%lx\n", vaddr, dp->domain_id,
- cr3, pgd3val);
-
if ( pgd3val == 0 )
{
l4t = map_domain_page(mfn);
l4e = l4t[l4_table_offset(vaddr)];
unmap_domain_page(l4t);
mfn = l4e_get_mfn(l4e);
- DBGP2("l4t:%p l4to:%lx l4e:%lx mfn:%#"PRI_mfn"\n", l4t,
- l4_table_offset(vaddr), l4e, mfn_x(mfn));
if ( !(l4e_get_flags(l4e) & _PAGE_PRESENT) )
- {
- DBGP1("l4 PAGE not present. vaddr:%lx cr3:%lx\n", vaddr, cr3);
return INVALID_MFN;
- }
l3t = map_domain_page(mfn);
l3e = l3t[l3_table_offset(vaddr)];
unmap_domain_page(l3t);
mfn = l3e_get_mfn(l3e);
- DBGP2("l3t:%p l3to:%lx l3e:%lx mfn:%#"PRI_mfn"\n", l3t,
- l3_table_offset(vaddr), l3e, mfn_x(mfn));
if ( !(l3e_get_flags(l3e) & _PAGE_PRESENT) ||
(l3e_get_flags(l3e) & _PAGE_PSE) )
- {
- DBGP1("l3 PAGE not present. vaddr:%lx cr3:%lx\n", vaddr, cr3);
return INVALID_MFN;
- }
}
l2t = map_domain_page(mfn);
l2e = l2t[l2_table_offset(vaddr)];
unmap_domain_page(l2t);
mfn = l2e_get_mfn(l2e);
- DBGP2("l2t:%p l2to:%lx l2e:%lx mfn:%#"PRI_mfn"\n",
- l2t, l2_table_offset(vaddr), l2e, mfn_x(mfn));
if ( !(l2e_get_flags(l2e) & _PAGE_PRESENT) ||
(l2e_get_flags(l2e) & _PAGE_PSE) )
- {
- DBGP1("l2 PAGE not present. vaddr:%lx cr3:%lx\n", vaddr, cr3);
return INVALID_MFN;
- }
+
l1t = map_domain_page(mfn);
l1e = l1t[l1_table_offset(vaddr)];
unmap_domain_page(l1t);
mfn = l1e_get_mfn(l1e);
- DBGP2("l1t:%p l1to:%lx l1e:%lx mfn:%#"PRI_mfn"\n", l1t, l1_table_offset(vaddr),
- l1e, mfn_x(mfn));
return mfn_valid(mfn) ? mfn : INVALID_MFN;
}
@@ -210,9 +164,6 @@ unsigned int dbg_rw_mem(void * __user addr, void * __user buf,
unsigned int len, domid_t domid, bool toaddr,
uint64_t pgd3)
{
- DBGP2("gmem:addr:%lx buf:%p len:$%u domid:%d toaddr:%x\n",
- addr, buf, len, domid, toaddr);
-
if ( domid == DOMID_IDLE )
{
if ( toaddr )
@@ -232,7 +183,6 @@ unsigned int dbg_rw_mem(void * __user addr, void * __user buf,
}
}
- DBGP2("gmem:exit:len:$%d\n", len);
return len;
}
@@ -36,6 +36,7 @@
#include <asm/psr.h>
#include <asm/cpuid.h>
+#ifdef CONFIG_GDBSX
static int gdbsx_guest_mem_io(domid_t domid, struct xen_domctl_gdbsx_memio *iop)
{
void * __user gva = (void *)iop->gva, * __user uva = (void *)iop->uva;
@@ -45,6 +46,7 @@ static int gdbsx_guest_mem_io(domid_t domid, struct xen_domctl_gdbsx_memio *iop)
return iop->remain ? -EFAULT : 0;
}
+#endif
static void domain_cpu_policy_changed(struct domain *d)
{
@@ -912,6 +914,7 @@ long arch_do_domctl(
}
#endif
+#ifdef CONFIG_GDBSX
case XEN_DOMCTL_gdbsx_guestmemio:
domctl->u.gdbsx_guest_memio.remain = domctl->u.gdbsx_guest_memio.len;
ret = gdbsx_guest_mem_io(domctl->domain, &domctl->u.gdbsx_guest_memio);
@@ -976,6 +979,7 @@ long arch_do_domctl(
copyback = true;
break;
}
+#endif
case XEN_DOMCTL_setvcpuextstate:
case XEN_DOMCTL_getvcpuextstate:
@@ -90,8 +90,10 @@ static inline bool debugger_trap_entry(
#endif
+#ifdef CONFIG_GDBSX
unsigned int dbg_rw_mem(void * __user addr, void * __user buf,
unsigned int len, domid_t domid, bool toaddr,
uint64_t pgd3);
+#endif
#endif /* __X86_DEBUGGER_H__ */
Gdbsx support in the hypervisor is rarely used and it is opening a way for dom0 to modify the running hypervisor by very easy means. Add a Kconfig option to control support of gdbsx. Default is off. While at it correct a wrong comment in related code and remove dead code. Signed-off-by: Juergen Gross <jgross@suse.com> --- xen/Kconfig.debug | 7 ++++++ xen/arch/x86/Makefile | 2 +- xen/arch/x86/debug.c | 52 +----------------------------------------- xen/arch/x86/domctl.c | 4 ++++ xen/include/asm-x86/debugger.h | 2 ++ 5 files changed, 15 insertions(+), 52 deletions(-)