On 29 May 2015 at 16:19, Alex Bennée <alex.bennee@xxxxxxxxxx> wrote: > This adds basic support for HW assisted debug. The ioctl interface to > KVM allows us to pass an implementation defined number of break and > watch point registers. When KVM_GUESTDBG_USE_HW_BP is specified these > debug registers will be installed in place on the world switch into the > guest. > > The hardware is actually capable of more advanced matching but it is > unclear if this expressiveness is available via the gdbstub protocol. > > Signed-off-by: Alex Bennée <alex.bennee@xxxxxxxxxx> > > --- > v2 > - correct setting of PMC/BAS/MASK > - improved commentary > - added helper function to check watchpoint in range > - fix find/deletion of watchpoints > v3 > - use internals.h definitions > --- > target-arm/kvm.c | 35 +++--- > target-arm/kvm64.c | 304 ++++++++++++++++++++++++++++++++++++++++++++++++++- > target-arm/kvm_arm.h | 21 ++++ > 3 files changed, 338 insertions(+), 22 deletions(-) > > diff --git a/target-arm/kvm.c b/target-arm/kvm.c > index de2865a..e1fccdd 100644 > --- a/target-arm/kvm.c > +++ b/target-arm/kvm.c > @@ -17,6 +17,7 @@ > > #include "qemu-common.h" > #include "qemu/timer.h" > +#include "qemu/error-report.h" > #include "sysemu/sysemu.h" > #include "sysemu/kvm.h" > #include "kvm_arm.h" > @@ -540,6 +541,16 @@ static int kvm_handle_debug(CPUState *cs, struct kvm_run *run) > return true; > } > break; > + case EC_BREAKPOINT: > + if (kvm_arm_find_hw_breakpoint(cs, env->pc)) { > + return true; > + } > + break; > + case EC_WATCHPOINT: > + if (kvm_arm_find_hw_watchpoint(cs, arch_info->far)) { > + return true; > + } I assume the kernel is giving us the hardware behaviour of "watchpoint traps happen before load/store execution, not after"? (This is the correct thing from the POV of the rest of QEMU.) > + break; > default: > error_report("%s: unhandled debug exit (%"PRIx32", %"PRIx64")\n", > __func__, arch_info->hsr, env->pc); > @@ -601,6 +612,10 @@ void kvm_arch_update_guest_debug(CPUState *cs, struct kvm_guest_debug *dbg) > if (kvm_sw_breakpoints_active(cs)) { > dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_SW_BP; > } > + if (kvm_hw_breakpoints_active(cs)) { > + dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_HW_BP; > + kvm_copy_hw_breakpoint_data(&dbg->arch); > + } > } > > /* C6.6.29 BRK instruction */ > @@ -627,26 +642,6 @@ int kvm_arch_remove_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp) > return 0; > } > > -int kvm_arch_insert_hw_breakpoint(target_ulong addr, > - target_ulong len, int type) > -{ > - qemu_log_mask(LOG_UNIMP, "%s: not implemented\n", __func__); > - return -EINVAL; > -} > - > -int kvm_arch_remove_hw_breakpoint(target_ulong addr, > - target_ulong len, int type) > -{ > - qemu_log_mask(LOG_UNIMP, "%s: not implemented\n", __func__); > - return -EINVAL; > -} > - > - > -void kvm_arch_remove_all_hw_breakpoints(void) > -{ > - qemu_log_mask(LOG_UNIMP, "%s: not implemented\n", __func__); > -} > - > void kvm_arch_init_irq_routing(KVMState *s) > { > } > diff --git a/target-arm/kvm64.c b/target-arm/kvm64.c > index 61592d2..06d4e1e 100644 > --- a/target-arm/kvm64.c > +++ b/target-arm/kvm64.c > @@ -2,6 +2,7 @@ > * ARM implementation of KVM hooks, 64 bit specific code > * > * Copyright Mian-M. Hamayun 2013, Virtual Open Systems > + * Copyright Alex Bennée 2014, Linaro Really 2014? :-) > * > * This work is licensed under the terms of the GNU GPL, version 2 or later. > * See the COPYING file in the top-level directory. > @@ -12,12 +13,18 @@ > #include <sys/types.h> > #include <sys/ioctl.h> > #include <sys/mman.h> > +#include <sys/ptrace.h> > +#include <asm/ptrace.h> > > +#include <linux/elf.h> > #include <linux/kvm.h> > > #include "config-host.h" > #include "qemu-common.h" > #include "qemu/timer.h" > +#include "qemu/host-utils.h" > +#include "qemu/error-report.h" > +#include "exec/gdbstub.h" > #include "sysemu/sysemu.h" > #include "sysemu/kvm.h" > #include "kvm_arm.h" > @@ -26,21 +33,314 @@ > #include "hw/arm/arm.h" > > static bool have_guest_debug; > +/* Max and current break/watch point counts */ > +int max_hw_bp, max_hw_wp; > +int cur_hw_bp, cur_hw_wp; > +struct kvm_guest_debug_arch guest_debug_registers; ...did we figure out how this works for SMP? > > /** > - * kvm_arm_init_debug() > + * kvm_arm_init_debug() - check for guest debug capabilities > * @cs: CPUState > * > - * Check for guest debug capabilities. > + * kvm_check_extension returns 0 if we have no debug registers or the > + * number we have. > * > */ > static void kvm_arm_init_debug(CPUState *cs) > { > have_guest_debug = kvm_check_extension(cs->kvm_state, > KVM_CAP_SET_GUEST_DEBUG); > + max_hw_wp = kvm_check_extension(cs->kvm_state, KVM_CAP_GUEST_DEBUG_HW_WPS); > + max_hw_bp = kvm_check_extension(cs->kvm_state, KVM_CAP_GUEST_DEBUG_HW_BPS); > return; > } > > +/** > + * insert_hw_breakpoint() > + * @addr: address of breakpoint > + * > + * See ARM ARM D2.9.1 for details but here we are only going to create > + * simple un-linked breakpoints (i.e. we don't chain breakpoints > + * together to match address and context or vmid). The hardware is > + * capable of fancier matching but that will require exposing that > + * fanciness to GDB's interface > + * > + * D7.3.2 DBGBCR<n>_EL1, Debug Breakpoint Control Registers > + * > + * 31 24 23 20 19 16 15 14 13 12 9 8 5 4 3 2 1 0 > + * +------+------+-------+-----+----+------+-----+------+-----+---+ > + * | RES0 | BT | LBN | SSC | HMC| RES0 | BAS | RES0 | PMC | E | > + * +------+------+-------+-----+----+------+-----+------+-----+---+ > + * > + * BT: Breakpoint type (0 = unlinked address match) > + * LBN: Linked BP number (0 = unused) > + * SSC/HMC/PMC: Security, Higher and Priv access control (Table D-12) > + * BAS: Byte Address Select (RES1 for AArch64) > + * E: Enable bit > + */ > +static int insert_hw_breakpoint(target_ulong addr) > +{ > + uint32_t bcr = 0x1; /* E=1, enable */ > + if (cur_hw_bp >= max_hw_bp) { > + return -ENOBUFS; > + } > + bcr = deposit32(bcr, 1, 2, 0x3); /* PMC = 11 */ "0b11" would make it clearer you didn't mean decimal 11 here. > + bcr = deposit32(bcr, 5, 4, 0xf); /* BAS = RES1 */ > + guest_debug_registers.dbg_bcr[cur_hw_bp] = bcr; > + guest_debug_registers.dbg_bvr[cur_hw_bp] = addr; > + cur_hw_bp++; > + return 0; > +} > + > +/** > + * delete_hw_breakpoint() > + * @pc: address of breakpoint > + * > + * Delete a breakpoint and shuffle any above down > + */ > + > +static int delete_hw_breakpoint(target_ulong pc) > +{ > + int i; > + for (i = 0; i < cur_hw_bp; i++) { > + if (guest_debug_registers.dbg_bvr[i] == pc) { > + while (i < cur_hw_bp) { > + if (i == max_hw_bp) { When can i be less than cur_hw_bp but still equal to max_hw_bp ? > + guest_debug_registers.dbg_bvr[i] = 0; > + guest_debug_registers.dbg_bcr[i] = 0; > + } else { > + guest_debug_registers.dbg_bvr[i] = > + guest_debug_registers.dbg_bvr[i + 1]; > + guest_debug_registers.dbg_bcr[i] = > + guest_debug_registers.dbg_bcr[i + 1]; > + } > + i++; > + } > + cur_hw_bp--; > + return 0; > + } > + } > + return -ENOENT; > +} > + > +/** > + * insert_hw_watchpoint() > + * @addr: address of watch point > + * @len: size of area > + * @type: type of watch point > + * > + * See ARM ARM D2.10. As with the breakpoints we can do some advanced > + * stuff if we want to. The watch points can be linked with the break > + * points above to make them context aware. However for simplicity > + * currently we only deal with simple read/write watch points. > + * > + * D7.3.11 DBGWCR<n>_EL1, Debug Watchpoint Control Registers > + * > + * 31 29 28 24 23 21 20 19 16 15 14 13 12 5 4 3 2 1 0 > + * +------+-------+------+----+-----+-----+-----+-----+-----+-----+---+ > + * | RES0 | MASK | RES0 | WT | LBN | SSC | HMC | BAS | LSC | PAC | E | > + * +------+-------+------+----+-----+-----+-----+-----+-----+-----+---+ > + * > + * MASK: num bits addr mask (0=none,01/10=res,11=3 bits (8 bytes)) > + * WT: 0 - unlinked, 1 - linked (not currently used) > + * LBN: Linked BP number (not currently used) > + * SSC/HMC/PAC: Security, Higher and Priv access control (Table D-12) > + * BAS: Byte Address Select > + * LSC: Load/Store control (01: load, 10: store, 11: both) > + * E: Enable > + * > + * The bottom 2 bits of the value register are masked. Therefor to > + * break on an sizes smaller than unaligned byte you need to set > + * MASK=0, BAS=bit per byte in question. For larger regions (^2) you > + * need to ensure you mask the address as required and set BAS=0xff > + */ > + > +static int insert_hw_watchpoint(target_ulong addr, > + target_ulong len, int type) > +{ > + uint32_t dbgwcr = 1; /* E=1, enable */ > + uint64_t dbgwvr = addr & (~0x7ULL); > + > + if (cur_hw_wp >= max_hw_wp) { > + return -ENOBUFS; > + } > + > + /* PAC 00 is reserved, assume EL1 exception */ > + dbgwcr = deposit32(dbgwcr, 1, 2, 1); > + > + switch (type) { > + case GDB_WATCHPOINT_READ: > + dbgwcr = deposit32(dbgwcr, 3, 2, 1); > + break; > + case GDB_WATCHPOINT_WRITE: > + dbgwcr = deposit32(dbgwcr, 3, 2, 2); > + break; > + case GDB_WATCHPOINT_ACCESS: > + dbgwcr = deposit32(dbgwcr, 3, 2, 3); > + break; > + default: > + g_assert_not_reached(); > + break; > + } > + if (len <= 8) { > + /* we align the address and set the bits in BAS */ > + int off = addr & 0x7; > + int bas = (1 << len)-1; > + dbgwcr = deposit32(dbgwcr, 5+off, 8-off, bas); > + } else { > + /* For ranges above 8 bytes we need to be a power of 2 */ > + if (ctpop64(len)==1) { > + int bits = ctz64(len); > + dbgwvr &= ~((1 << bits)-1); > + dbgwcr = deposit32(dbgwcr, 24, 4, bits); > + dbgwcr = deposit32(dbgwcr, 5, 8, 0xff); > + } else { > + return -ENOBUFS; > + } > + } > + > + guest_debug_registers.dbg_wcr[cur_hw_wp] = dbgwcr; > + guest_debug_registers.dbg_wvr[cur_hw_wp] = dbgwvr; > + cur_hw_wp++; > + return 0; > +} > + > + > +static bool check_watchpoint_in_range(int i, target_ulong addr) > +{ > + uint32_t dbgwcr = guest_debug_registers.dbg_wcr[i]; > + uint64_t addr_top, addr_bottom = guest_debug_registers.dbg_wvr[i]; > + int bas = extract32(dbgwcr, 5, 8); > + int mask = extract32(dbgwcr, 24, 4); > + > + if (mask) { > + addr_top = addr_bottom + (1 << mask); > + } else { > + /* BAS must be contiguous but can offset against the base > + * address in DBGWVR */ > + addr_bottom = addr_bottom + ctz32(bas); > + addr_top = addr_bottom + clo32(bas); > + } > + > + if (addr >= addr_bottom && addr <= addr_top ) { > + return true; > + } > + > + return false; > +} > + > +/** > + * delete_hw_watchpoint() > + * @addr: address of breakpoint > + * > + * Delete a breakpoint and shuffle any above down > + */ > + > +static int delete_hw_watchpoint(target_ulong addr, > + target_ulong len, int type) > +{ > + int i; > + for (i = 0; i < cur_hw_wp; i++) { > + if (check_watchpoint_in_range(i, addr)) { > + while (i < cur_hw_wp) { > + if (i == max_hw_wp) { > + guest_debug_registers.dbg_wvr[i] = 0; > + guest_debug_registers.dbg_wcr[i] = 0; > + } else { > + guest_debug_registers.dbg_wvr[i] = > + guest_debug_registers.dbg_wvr[i + 1]; > + guest_debug_registers.dbg_wcr[i] = > + guest_debug_registers.dbg_wcr[i + 1]; > + } > + i++; > + } > + cur_hw_wp--; > + return 0; > + } > + } > + return -ENOENT; > +} > + > + > +int kvm_arch_insert_hw_breakpoint(target_ulong addr, > + target_ulong len, int type) > +{ > + switch (type) { > + case GDB_BREAKPOINT_HW: > + return insert_hw_breakpoint(addr); > + break; > + case GDB_WATCHPOINT_READ: > + case GDB_WATCHPOINT_WRITE: > + case GDB_WATCHPOINT_ACCESS: > + return insert_hw_watchpoint(addr, len, type); > + default: > + return -ENOSYS; > + } More missing guards for "no kernel support" ? > +} > + > +int kvm_arch_remove_hw_breakpoint(target_ulong addr, > + target_ulong len, int type) > +{ > + switch (type) { > + case GDB_BREAKPOINT_HW: > + return delete_hw_breakpoint(addr); > + break; > + case GDB_WATCHPOINT_READ: > + case GDB_WATCHPOINT_WRITE: > + case GDB_WATCHPOINT_ACCESS: > + return delete_hw_watchpoint(addr, len, type); > + default: > + return -ENOSYS; > + } > +} > + > + > +void kvm_arch_remove_all_hw_breakpoints(void) > +{ > + memset((void *)&guest_debug_registers, 0, sizeof(guest_debug_registers)); > + cur_hw_bp = 0; > + cur_hw_wp = 0; > +} > + > +void kvm_copy_hw_breakpoint_data(struct kvm_guest_debug_arch *ptr) > +{ > + /* Compile time assert? */ > + g_assert(sizeof(struct kvm_guest_debug_arch) == sizeof(guest_debug_registers)); This assert doesn't seem to me to serve any particularly useful purpose. > + memcpy(ptr, &guest_debug_registers, sizeof(guest_debug_registers)); > +} > + > +bool kvm_hw_breakpoints_active(CPUState *cs) > +{ > + return ( (cur_hw_bp > 0) || (cur_hw_wp >0) ) ? TRUE:FALSE; Weirdo spacing, TRUE/FALSE aren't capitalised, and boolexpr ? true : false is the same as boolexpr anyway. > +} > + > +bool kvm_arm_find_hw_breakpoint(CPUState *cpu, target_ulong pc) > +{ > + if (kvm_hw_breakpoints_active(cpu)) { > + int i; > + for (i=0; i<cur_hw_bp; i++) { More spacing oddities. > + if (guest_debug_registers.dbg_bvr[i] == pc) { > + return true; > + } > + } > + } > + return false; > +} > + > +bool kvm_arm_find_hw_watchpoint(CPUState *cpu, target_ulong addr) > +{ > + if (kvm_hw_breakpoints_active(cpu)) { > + int i; > + for (i=0; i<cur_hw_wp; i++) { > + if (check_watchpoint_in_range(i, addr)) { > + return true; > + } > + } > + } > + return false; > +} > + > + > static inline void set_feature(uint64_t *features, int feature) > { > *features |= 1ULL << feature; > diff --git a/target-arm/kvm_arm.h b/target-arm/kvm_arm.h > index 5abd591..9d713bc 100644 > --- a/target-arm/kvm_arm.h > +++ b/target-arm/kvm_arm.h > @@ -179,6 +179,27 @@ int kvm_arm_sync_mpstate_to_kvm(ARMCPU *cpu); > */ > int kvm_arm_sync_mpstate_to_qemu(ARMCPU *cpu); > > +bool kvm_hw_breakpoints_active(CPUState *cs); > +void kvm_copy_hw_breakpoint_data(struct kvm_guest_debug_arch *ptr); > + > +/** > + * kvm_arm_find_hw_breakpoint: > + * @cpu: CPUState > + * @pc: pc of breakpoint > + * > + * Return TRUE if the pc matches one of our breakpoints. 'true'. > + */ > +bool kvm_arm_find_hw_breakpoint(CPUState *cpu, target_ulong pc); > + > +/** > + * kvm_arm_find_hw_watchpoint: > + * @cpu: CPUState > + * @addr: address of watchpoint > + * > + * Return TRUE if the addr matches one of our watchpoints. > + */ > +bool kvm_arm_find_hw_watchpoint(CPUState *cpu, target_ulong addr); > + > #endif > > #endif -- PMM -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html