> -----Original Message-----
> From: Wood Scott-B07421
> Sent: Saturday, February 02, 2013 4:09 AM
> To: Alexander Graf
> Cc: Bhushan Bharat-R65777; kvm-ppc@vger.kernel.org; k...@vger.kernel.org
> Subject: Re: [PATCH 8/8] KVM:PPC:booke: Allow debug interrupt injection to 
> guest
> 
> On 01/31/2013 06:11:32 PM, Alexander Graf wrote:
> >
> > On 31.01.2013, at 23:40, Scott Wood wrote:
> >
> > > On 01/31/2013 01:20:39 PM, Alexander Graf wrote:
> > >> On 31.01.2013, at 20:05, Alexander Graf wrote:
> > >> >
> > >> > On 31.01.2013, at 19:54, Scott Wood wrote:
> > >> >
> > >> >> On 01/31/2013 12:52:41 PM, Alexander Graf wrote:
> > >> >>> On 31.01.2013, at 19:43, Scott Wood wrote:
> > >> >>>> On 01/31/2013 12:21:07 PM, Alexander Graf wrote:
> > >> >>>>> How about something like this? Then both targets at least
> > suck as much :).
> > >> >>>>
> > >> >>>> I'm not sure that should be the goal...
> > >> >>>>
> > >> >>>>> Thanks to e500mc's awful hardware design, we don't know who
> > sets the MSR_DE bit. Once we forced it onto the guest, we have no
> > change to know whether the guest also set it or not. We could only
> > guess.
> > >> >>>>
> > >> >>>> MSRP[DEP] can prevent the guest from modifying MSR[DE] -- but
> > we still need to set it in the first place.
> > >> >>>>
> > >> >>>> According to ISA V2.06B, the hypervisor should set DBCR0[EDM]
> > to let the guest know that the debug resources are not available, and
> > that "the value of MSR[DE] is not specified and not modifiable".
> > >> >>> So what would the guest do then to tell the hypervisor that it
> > actually wants to know about debug events?
> > >> >>
> > >> >> The guest is out of luck, just as if a JTAG were in use.
> > >> >
> > >> > Hrm.
> > >> >
> > >> > Can we somehow generalize this "out of luck" behavior?
> > >> >
> > >> > Every time we would set or clear an MSR bit in shadow_msr on
> > e500v2, we would instead set or clear it in the real MSR. That way
> > only e500mc is out of luck, but the code would still be shared.
> > >
> > > I don't follow.  e500v2 is just as out-of-luck.  The mechanism
> > simply does not support sharing debug resources.
> >
> > For e500v2 we have 2 fields
> >
> >   * MSR as the guest sees it
> >   * MSR as we execute when the guest runs
> >
> > Since we know the MSR when the guest sees it, we can decide what to do
> > when we get an unhandled debug interrupt.
> 
> That's not the same thing as making the real MSR[DE] show up in the guest
> MSR[DE].
> 
> There are other problems with sharing -- what happens when both host and guest
> try to write to a particular IAC or DAC?
> 
> Also, performance would be pretty awful if the guest has e.g. single stepping 
> in
> DBCR0 enabled but MSR[DE]=0, and the host doesn't care about single stepping
> (but does want debugging enabled in general).
> 
> > > What do you mean by "the real MSR"?  The real MSR is shadow_msr,
> > and MSR_DE must always be set there if the host is debugging the
> > guest.  As for reflecting it into the guest MSR, we could, but I don't
> > really see the point.  We're never going to actually send a debug
> > exception to the guest when the host owns the debug resources.
> >
> > Why not? That's the whole point of jumping through user space.
> 
> That's still needed for software breakpoints, which don't rely on the debug
> resources.
> 
> >   1) guest exits with debug interrupt
> >   2) QEMU gets a debug exit
> >   3) QEMU checks in its list whether it belongs to its own debug
> > points
> >   4) if not, it reinjects the interrupt into the guest
> >
> > Step 4 is pretty difficult to do when we don't know whether the guest
> > is actually capable of handling debug interrupts at that moment.
> 
> Software breakpoints take a Program interrupt rather than a Debug interrupt,
> unless MSR[DE]=1 and DBCR0[TRAP]=1.  If the guest does not own debug resources
> we should always send it to the Program interrupt, so MSR[DE] doesn't matter.
> 
> > > The "&= ~MSR_DE" line is pointless on bookehv, and makes it harder
> > to read.  I had to stare at it a while before noticing that you
> > initially set is_debug from the guest MSR and that you'd never really
> > clear MSR_DE here on bookehv.
> >
> > Well, I'm mostly bouncing ideas here to find a way to express what
> > we're trying to say in a way that someone who hasn't read this email
> > thread would still understand what's going on :).
> 
> I think it's already straightforward enough if you accept that shared debug
> resources aren't supported, and that we are either in a mode where the real
> MSR[DE] reflects the guest MSR[DE], or a mode where the real MSR[DE] is always
> on in guest mode and the guest MSR[DE] is irrelevant.
> 
> > How about this version?
> >
> >
> > diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c index
> > 38a62ef..9929c41 100644
> > --- a/arch/powerpc/kvm/booke.c
> > +++ b/arch/powerpc/kvm/booke.c
> > @@ -133,6 +133,28 @@ static void kvmppc_vcpu_sync_fpu(struct kvm_vcpu
> > *vcpu)
> >  #endif
> >  }
> >
> > +static void kvmppc_vcpu_sync_debug(struct kvm_vcpu *vcpu) { #ifndef
> > +CONFIG_KVM_BOOKE_HV
> > +   /* Synchronize guest's desire to get debug interrupts into
> > shadow MSR */
> > +   vcpu->arch.shadow_msr &= ~MSR_DE;
> > +   vcpu->arch.shadow_msr |= vcpu->arch.shared->msr & MSR_DE; #endif
> > +
> > +   /* Force enable debug interrupts when user space wants to debug
> > */
> > +   if (vcpu->guest_debug) {
> > +#ifdef CONFIG_KVM_BOOKE_HV
> > +           /*
> > +            * Since there is no shadow MSR, sync MSR_DE into the
> > guest
> > +            * visible MSR.
> > +            */
> > +           vcpu->arch.shared->msr |= MSR_DE;
> > +#else
> > +           vcpu->arch.shadow_msr |= MSR_DE;
> > +#endif
> > +   }
> > +}
> 
> This shows "guest's desire to get debug interrupts" in a context that is not
> specifically for !vcpu->guest_debug, which is misleading.
> 
> > +
> >  /*
> >   * Helper function for "full" MSR writes.  No need to call this if
> > only
> >   * EE/CE/ME/DE/RI are changing.
> > @@ -150,6 +172,7 @@ void kvmppc_set_msr(struct kvm_vcpu *vcpu, u32
> > new_msr)
> >     kvmppc_mmu_msr_notify(vcpu, old_msr);
> >     kvmppc_vcpu_sync_spe(vcpu);
> >     kvmppc_vcpu_sync_fpu(vcpu);
> > +   kvmppc_vcpu_sync_debug(vcpu);
> >  }
> >
> >  static void kvmppc_booke_queue_irqprio(struct kvm_vcpu *vcpu,
> >
> >
> > My main concern here is that we don't know when to remove MSR_DE again
> > from the (shadow) MSR. So how about this one instead?
> 
> Why wouldn't you know this?  if (vcpu->guest_debug) { you never remove it } 
> else
> { just copy whatever's in guest MSR }

I think we are ok with shadow_msr on e500v2 but we can have problem on bookehv 
where we do not know when to clear MSR_DE in shared->msr.

How it works on e500mc:
        (1) User-space makes ioctl to use debug resource, we set 
vcpu->guest_debug.
        (2) Before entering into the guest we check vcpu->guest_debug flag and 
if set we set MSR_DE in shared->msr.
        (3) Sometime later user-space releases the debug resource then in ioctl 
handling will clear vcpu->guest_debug.
        (4) Now when entering to guest we do not know what to do with MSR_DE in 
shared->msr as we do now know if guest might have tried to set/clear MSR_DE in 
between step (2) and step(3). What should be safe thing to do? Can we leave 
MSR_DE set or clear MSR_DE. If we want to clear MSR_DE then will it be good 
idea to clear this in step (3) above (in ioctl where we clear 
vcpu->guest_debug).


On e500v2 we have separate shadow_msr and shared->msr so the flow can be:
        (1) User-space makes ioctl to use debug resource, we set 
vcpu->guest_debug.
        (2) Before entering into the guest we check vcpu->guest_debug flag and 
we set MSR_DE in vcpu->arch.shadow_msr. And if vcpu->guest_debug flag is not 
set then use vcpu->arch.shared->msr for MSR_DE in shadow_msr.
        (3) User-space releases the debug resource then in ioctl handling will 
clear vcpu->guest_debug.
        (4) Now when entering to guest set shadow_msr as per 
vcpu->arch.shared->msr. 

Thanks
-Bharat


> 
> > diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c index
> > 38a62ef..2676703 100644
> > --- a/arch/powerpc/kvm/booke.c
> > +++ b/arch/powerpc/kvm/booke.c
> > @@ -142,7 +142,7 @@ void kvmppc_set_msr(struct kvm_vcpu *vcpu, u32
> > new_msr)
> >     u32 old_msr = vcpu->arch.shared->msr;
> >
> >  #ifdef CONFIG_KVM_BOOKE_HV
> > -   new_msr |= MSR_GS;
> > +   new_msr |= MSR_GS | MSR_DE;
> >  #endif
> >
> >     vcpu->arch.shared->msr = new_msr;
> >
> >
> > That would semantically move e500mc to the same logic as e500v2. With
> > the main difference that we have no idea what MSR_DE value the guest
> > really wanted to have set.
> 
> This would break the case where the guest owns the debug resources.
> 
> > If I read the spec correctly, rfci traps.
> 
> rfdi is the relevant one for e500mc, but yes.
> 
> > So we know the time frame from [inject debug interrupt ... rfci].
> > During that time we know for sure that the guest thinks MSR_DE is 0.
> 
> No, we don't.  The guest could have tried to use mtmsr or rfi to enable 
> MSR[DE].
> It could have seen the context it came from was userspace, and scheduled to
> another process, etc.
> 
> > Outside of that context, we just have to assume the guest can always
> > receive debug interrupts if it configured them.
> 
> No.
> 
> -Scott

--
To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to