aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMadhavan Srinivasan <maddy@linux.vnet.ibm.com>2014-09-09 13:07:35 -0400
committerAlexander Graf <agraf@suse.de>2014-09-22 04:11:35 -0400
commita59c1d9e609c4bbad9ec3b238221ecf3b9ca091b (patch)
treeba1f264b568db3ca4ff579ccf6fe935b75d635ec
parentd2ca32a2d4f029b90e4b8f67879a9dfead0c85fa (diff)
powerpc/kvm: support to handle sw breakpoint
This patch adds kernel side support for software breakpoint. Design is that, by using an illegal instruction, we trap to hypervisor via Emulation Assistance interrupt, where we check for the illegal instruction and accordingly we return to Host or Guest. Patch also adds support for software breakpoint in PR KVM. Signed-off-by: Madhavan Srinivasan <maddy@linux.vnet.ibm.com> Signed-off-by: Alexander Graf <agraf@suse.de>
-rw-r--r--arch/powerpc/include/asm/kvm_ppc.h6
-rw-r--r--arch/powerpc/kvm/book3s.c3
-rw-r--r--arch/powerpc/kvm/book3s_hv.c41
-rw-r--r--arch/powerpc/kvm/book3s_pr.c3
-rw-r--r--arch/powerpc/kvm/emulate.c15
5 files changed, 63 insertions, 5 deletions
diff --git a/arch/powerpc/include/asm/kvm_ppc.h b/arch/powerpc/include/asm/kvm_ppc.h
index 73063ef53694..dbd160f16cb0 100644
--- a/arch/powerpc/include/asm/kvm_ppc.h
+++ b/arch/powerpc/include/asm/kvm_ppc.h
@@ -38,6 +38,12 @@
38#include <asm/paca.h> 38#include <asm/paca.h>
39#endif 39#endif
40 40
41/*
42 * KVMPPC_INST_SW_BREAKPOINT is debug Instruction
43 * for supporting software breakpoint.
44 */
45#define KVMPPC_INST_SW_BREAKPOINT 0x00dddd00
46
41enum emulation_result { 47enum emulation_result {
42 EMULATE_DONE, /* no further processing */ 48 EMULATE_DONE, /* no further processing */
43 EMULATE_DO_MMIO, /* kvm_run filled with MMIO request */ 49 EMULATE_DO_MMIO, /* kvm_run filled with MMIO request */
diff --git a/arch/powerpc/kvm/book3s.c b/arch/powerpc/kvm/book3s.c
index f23b6a553082..27d1b7041746 100644
--- a/arch/powerpc/kvm/book3s.c
+++ b/arch/powerpc/kvm/book3s.c
@@ -715,7 +715,8 @@ int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
715int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 715int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
716 struct kvm_guest_debug *dbg) 716 struct kvm_guest_debug *dbg)
717{ 717{
718 return -EINVAL; 718 vcpu->guest_debug = dbg->control;
719 return 0;
719} 720}
720 721
721void kvmppc_decrementer_func(struct kvm_vcpu *vcpu) 722void kvmppc_decrementer_func(struct kvm_vcpu *vcpu)
diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c
index 529d10a7a36f..e63587d30b70 100644
--- a/arch/powerpc/kvm/book3s_hv.c
+++ b/arch/powerpc/kvm/book3s_hv.c
@@ -725,6 +725,30 @@ static int kvmppc_hcall_impl_hv(unsigned long cmd)
725 return kvmppc_hcall_impl_hv_realmode(cmd); 725 return kvmppc_hcall_impl_hv_realmode(cmd);
726} 726}
727 727
728static int kvmppc_emulate_debug_inst(struct kvm_run *run,
729 struct kvm_vcpu *vcpu)
730{
731 u32 last_inst;
732
733 if (kvmppc_get_last_inst(vcpu, INST_GENERIC, &last_inst) !=
734 EMULATE_DONE) {
735 /*
736 * Fetch failed, so return to guest and
737 * try executing it again.
738 */
739 return RESUME_GUEST;
740 }
741
742 if (last_inst == KVMPPC_INST_SW_BREAKPOINT) {
743 run->exit_reason = KVM_EXIT_DEBUG;
744 run->debug.arch.address = kvmppc_get_pc(vcpu);
745 return RESUME_HOST;
746 } else {
747 kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
748 return RESUME_GUEST;
749 }
750}
751
728static int kvmppc_handle_exit_hv(struct kvm_run *run, struct kvm_vcpu *vcpu, 752static int kvmppc_handle_exit_hv(struct kvm_run *run, struct kvm_vcpu *vcpu,
729 struct task_struct *tsk) 753 struct task_struct *tsk)
730{ 754{
@@ -807,12 +831,18 @@ static int kvmppc_handle_exit_hv(struct kvm_run *run, struct kvm_vcpu *vcpu,
807 break; 831 break;
808 /* 832 /*
809 * This occurs if the guest executes an illegal instruction. 833 * This occurs if the guest executes an illegal instruction.
810 * We just generate a program interrupt to the guest, since 834 * If the guest debug is disabled, generate a program interrupt
811 * we don't emulate any guest instructions at this stage. 835 * to the guest. If guest debug is enabled, we need to check
836 * whether the instruction is a software breakpoint instruction.
837 * Accordingly return to Guest or Host.
812 */ 838 */
813 case BOOK3S_INTERRUPT_H_EMUL_ASSIST: 839 case BOOK3S_INTERRUPT_H_EMUL_ASSIST:
814 kvmppc_core_queue_program(vcpu, SRR1_PROGILL); 840 if (vcpu->guest_debug & KVM_GUESTDBG_USE_SW_BP) {
815 r = RESUME_GUEST; 841 r = kvmppc_emulate_debug_inst(run, vcpu);
842 } else {
843 kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
844 r = RESUME_GUEST;
845 }
816 break; 846 break;
817 /* 847 /*
818 * This occurs if the guest (kernel or userspace), does something that 848 * This occurs if the guest (kernel or userspace), does something that
@@ -924,6 +954,9 @@ static int kvmppc_get_one_reg_hv(struct kvm_vcpu *vcpu, u64 id,
924 long int i; 954 long int i;
925 955
926 switch (id) { 956 switch (id) {
957 case KVM_REG_PPC_DEBUG_INST:
958 *val = get_reg_val(id, KVMPPC_INST_SW_BREAKPOINT);
959 break;
927 case KVM_REG_PPC_HIOR: 960 case KVM_REG_PPC_HIOR:
928 *val = get_reg_val(id, 0); 961 *val = get_reg_val(id, 0);
929 break; 962 break;
diff --git a/arch/powerpc/kvm/book3s_pr.c b/arch/powerpc/kvm/book3s_pr.c
index faffb27badd9..6d7370890775 100644
--- a/arch/powerpc/kvm/book3s_pr.c
+++ b/arch/powerpc/kvm/book3s_pr.c
@@ -1319,6 +1319,9 @@ static int kvmppc_get_one_reg_pr(struct kvm_vcpu *vcpu, u64 id,
1319 int r = 0; 1319 int r = 0;
1320 1320
1321 switch (id) { 1321 switch (id) {
1322 case KVM_REG_PPC_DEBUG_INST:
1323 *val = get_reg_val(id, KVMPPC_INST_SW_BREAKPOINT);
1324 break;
1322 case KVM_REG_PPC_HIOR: 1325 case KVM_REG_PPC_HIOR:
1323 *val = get_reg_val(id, to_book3s(vcpu)->hior); 1326 *val = get_reg_val(id, to_book3s(vcpu)->hior);
1324 break; 1327 break;
diff --git a/arch/powerpc/kvm/emulate.c b/arch/powerpc/kvm/emulate.c
index e96b50d0bdab..005222b580ea 100644
--- a/arch/powerpc/kvm/emulate.c
+++ b/arch/powerpc/kvm/emulate.c
@@ -274,6 +274,21 @@ int kvmppc_emulate_instruction(struct kvm_run *run, struct kvm_vcpu *vcpu)
274 } 274 }
275 break; 275 break;
276 276
277 case 0:
278 /*
279 * Instruction with primary opcode 0. Based on PowerISA
280 * these are illegal instructions.
281 */
282 if (inst == KVMPPC_INST_SW_BREAKPOINT) {
283 run->exit_reason = KVM_EXIT_DEBUG;
284 run->debug.arch.address = kvmppc_get_pc(vcpu);
285 emulated = EMULATE_EXIT_USER;
286 advance = 0;
287 } else
288 emulated = EMULATE_FAIL;
289
290 break;
291
277 default: 292 default:
278 emulated = EMULATE_FAIL; 293 emulated = EMULATE_FAIL;
279 } 294 }