From: "Chao Du" <duchao@eswincomputing.com>
To: "Anup Patel" <anup@brainfault.org>
Cc: "Anup Patel" <apatel@ventanamicro.com>,
kvm@vger.kernel.org, kvm-riscv@lists.infradead.org,
atishp@atishpatra.org, dbarboza@ventanamicro.com,
paul.walmsley@sifive.com, palmer@dabbelt.com,
aou@eecs.berkeley.edu
Subject: Re: Re: [RFC PATCH 0/3] RISC-V: KVM: Guest Debug Support
Date: Fri, 5 Jan 2024 17:42:11 +0800 (GMT+08:00) [thread overview]
Message-ID: <2f1b56a2.686.18cd90066b8.Coremail.duchao@eswincomputing.com> (raw)
In-Reply-To: <CAAhSdy0VWxjvKsxiad72JY7_Ottt5S9ymZ3axt=W3-4nf+g4VQ@mail.gmail.com>
On 2024-01-04 19:59, Anup Patel <anup@brainfault.org> wrote:
>
> On Fri, Dec 22, 2023 at 1:59 PM Chao Du <duchao@eswincomputing.com> wrote:
> >
> > On 2023-12-21 21:01, Anup Patel <apatel@ventanamicro.com> wrote:
> > >
> > > On Thu, Dec 21, 2023 at 3:21 PM Chao Du <duchao@eswincomputing.com> wrote:
> > > >
> > > > This series implements KVM Guest Debug on RISC-V. Currently, we can
> > > > debug RISC-V KVM guest from the host side, with software breakpoints.
> > > >
> > > > A brief test was done on QEMU RISC-V hypervisor emulator.
> > > >
> > > > A TODO list which will be added later:
> > > > 1. HW breakpoints support
> > > > 2. Test cases
> > >
> > > Himanshu has already done the complete HW breakpoint implementation
> > > in OpenSBI, Linux RISC-V, and KVM RISC-V. This is based on the upcoming
> > > SBI debug trigger extension draft proposal.
> > > (Refer, https://lists.riscv.org/g/tech-debug/message/1261)
> > >
> > > There are also RISE projects to track these efforts:
> > > https://wiki.riseproject.dev/pages/viewpage.action?pageId=394541
> > > https://wiki.riseproject.dev/pages/viewpage.action?pageId=394545
> > >
> > > Currently, we are in the process of upstreaming the OpenSBI support
> > > for SBI debug trigger extension. The Linux RISC-V and KVM RISC-V
> > > patches require SBI debug trigger extension and Sdtrig extension to
> > > be frozen which will happen next year 2024.
> > >
> > > Regards,
> > > Anup
> > >
> >
> > Hi Anup,
> >
> > Thank you for the information and your great work on the SBI
> > Debug Trigger Extension proposal.
> >
> > So I think that 'HW breakpoints support' in the above TODO list
> > will be taken care of by Himanshu following the extension proposal.
> >
> > On the other hand, if I understand correctly, the software
> > breakpoint part of KVM Guest Debug has no dependency on the new
> > extension since it does not use the trigger module. Just an
> > ebreak substitution is made.
> >
> > So may I know your suggestion about this RFC? Both in KVM and QEMU.
>
> Sorry for the delay in response due to holiday season other
> stuff keeping me busy.
No problem. :)
>
> If this is about ebreak instruction virtualization then this series
> needs following changes:
> 1) Update cover letter to indicate this series focus on ebreak
> instruction virtualization
> 2) PATCH1 and PATCH2 can be merged into one PATCH1
> 3) Include a new patch which adds KVM selftest for ebreak
> based guest debug. This selftest will test both:
> A) Taking "ebreak" trap from guest as KVM_EXIT_DEBUG
> in host user-space
> B) Taking "ebreak" trap from guest as BREAKPOINT
> exception in guest
Sure, I will prepare a V2 series.
Thanks.
>
> Regards,
> Anup
>
> >
> > Regards,
> > Chao
> >
> > > >
> > > > This series is based on Linux 6.7-rc6 and is also available at:
> > > > https://github.com/Du-Chao/linux/tree/riscv_gd_sw
> > > >
> > > > The matched QEMU is available at:
> > > > https://github.com/Du-Chao/qemu/tree/riscv_gd_sw
> > > >
> > > > Chao Du (3):
> > > > RISC-V: KVM: Enable the KVM_CAP_SET_GUEST_DEBUG capability
> > > > RISC-V: KVM: Implement kvm_arch_vcpu_ioctl_set_guest_debug()
> > > > RISC-V: KVM: Handle breakpoint exits for VCPU
> > > >
> > > > arch/riscv/include/uapi/asm/kvm.h | 1 +
> > > > arch/riscv/kvm/vcpu.c | 15 +++++++++++++--
> > > > arch/riscv/kvm/vcpu_exit.c | 4 ++++
> > > > arch/riscv/kvm/vm.c | 1 +
> > > > 4 files changed, 19 insertions(+), 2 deletions(-)
> > > >
> > > > --
> > > > 2.17.1
> > > >
> > > >
> > > > --
> > > > kvm-riscv mailing list
> > > > kvm-riscv@lists.infradead.org
> > > > http://lists.infradead.org/mailman/listinfo/kvm-riscv
prev parent reply other threads:[~2024-01-05 9:44 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-12-21 9:49 [RFC PATCH 0/3] RISC-V: KVM: Guest Debug Support Chao Du
2023-12-21 9:50 ` [RFC PATCH 1/3] RISC-V: KVM: Enable the KVM_CAP_SET_GUEST_DEBUG capability Chao Du
2023-12-21 9:50 ` [RFC PATCH 2/3] RISC-V: KVM: Implement kvm_arch_vcpu_ioctl_set_guest_debug() Chao Du
2023-12-21 9:50 ` [RFC PATCH 3/3] RISC-V: KVM: Handle breakpoint exits for VCPU Chao Du
2023-12-21 12:31 ` [RFC PATCH 0/3] RISC-V: KVM: Guest Debug Support Anup Patel
2023-12-22 8:28 ` Chao Du
2023-12-25 2:52 ` Chao Du
2024-01-04 10:22 ` Chao Du
2024-01-04 11:29 ` Anup Patel
2024-01-05 9:42 ` Chao Du [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2f1b56a2.686.18cd90066b8.Coremail.duchao@eswincomputing.com \
--to=duchao@eswincomputing.com \
--cc=anup@brainfault.org \
--cc=aou@eecs.berkeley.edu \
--cc=apatel@ventanamicro.com \
--cc=atishp@atishpatra.org \
--cc=dbarboza@ventanamicro.com \
--cc=kvm-riscv@lists.infradead.org \
--cc=kvm@vger.kernel.org \
--cc=palmer@dabbelt.com \
--cc=paul.walmsley@sifive.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox