kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Marcelo Tosatti <mtosatti@redhat.com>
To: Anthony Liguori <aliguori@us.ibm.com>
Cc: qemu-devel@nongnu.org, kvm@vger.kernel.org,
	Jan Kiszka <jan.kiszka@siemens.com>,
	Marcelo Tosatti <mtosatti@redhat.com>
Subject: [PATCH 34/35] kvm: x86: Push kvm_arch_debug to kvm_arch_handle_exit
Date: Tue, 15 Mar 2011 18:50:48 -0300	[thread overview]
Message-ID: <c9cf861448b69c8acac566f9a3c25d5e593e36f6.1300225848.git.mtosatti@redhat.com> (raw)
In-Reply-To: <cover.1300225848.git.mtosatti@redhat.com>

From: Jan Kiszka <jan.kiszka@siemens.com>

There are no generic bits remaining in the handling of KVM_EXIT_DEBUG.
So push its logic completely into arch hands, i.e. only x86 so far.

Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
---
 kvm-all.c         |   11 -----------
 kvm.h             |    2 --
 target-i386/kvm.c |   25 ++++++++++++++++---------
 3 files changed, 16 insertions(+), 22 deletions(-)

diff --git a/kvm-all.c b/kvm-all.c
index f34cb69..1d7e8ea 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@ -975,17 +975,6 @@ int kvm_cpu_exec(CPUState *env)
             ret = kvm_handle_internal_error(env, run);
             break;
 #endif
-#ifdef KVM_CAP_SET_GUEST_DEBUG
-        case KVM_EXIT_DEBUG:
-            DPRINTF("kvm_exit_debug\n");
-            if (kvm_arch_debug(&run->debug.arch)) {
-                ret = EXCP_DEBUG;
-                break;
-            }
-            /* re-enter, this exception was guest-internal */
-            ret = 0;
-            break;
-#endif /* KVM_CAP_SET_GUEST_DEBUG */
         default:
             DPRINTF("kvm_arch_handle_exit\n");
             ret = kvm_arch_handle_exit(env, run);
diff --git a/kvm.h b/kvm.h
index 7bc04e0..d565dba 100644
--- a/kvm.h
+++ b/kvm.h
@@ -136,8 +136,6 @@ struct kvm_sw_breakpoint {
 
 QTAILQ_HEAD(kvm_sw_breakpoint_head, kvm_sw_breakpoint);
 
-int kvm_arch_debug(struct kvm_debug_exit_arch *arch_info);
-
 struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *env,
                                                  target_ulong pc);
 
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 3920444..a13599d 100644
--- a/target-i386/kvm.c
+++ b/target-i386/kvm.c
@@ -1731,31 +1731,31 @@ void kvm_arch_remove_all_hw_breakpoints(void)
 
 static CPUWatchpoint hw_watchpoint;
 
-int kvm_arch_debug(struct kvm_debug_exit_arch *arch_info)
+static int kvm_handle_debug(struct kvm_debug_exit_arch *arch_info)
 {
-    int handle = 0;
+    int ret = 0;
     int n;
 
     if (arch_info->exception == 1) {
         if (arch_info->dr6 & (1 << 14)) {
             if (cpu_single_env->singlestep_enabled) {
-                handle = 1;
+                ret = EXCP_DEBUG;
             }
         } else {
             for (n = 0; n < 4; n++) {
                 if (arch_info->dr6 & (1 << n)) {
                     switch ((arch_info->dr7 >> (16 + n*4)) & 0x3) {
                     case 0x0:
-                        handle = 1;
+                        ret = EXCP_DEBUG;
                         break;
                     case 0x1:
-                        handle = 1;
+                        ret = EXCP_DEBUG;
                         cpu_single_env->watchpoint_hit = &hw_watchpoint;
                         hw_watchpoint.vaddr = hw_breakpoint[n].addr;
                         hw_watchpoint.flags = BP_MEM_WRITE;
                         break;
                     case 0x3:
-                        handle = 1;
+                        ret = EXCP_DEBUG;
                         cpu_single_env->watchpoint_hit = &hw_watchpoint;
                         hw_watchpoint.vaddr = hw_breakpoint[n].addr;
                         hw_watchpoint.flags = BP_MEM_ACCESS;
@@ -1765,17 +1765,18 @@ int kvm_arch_debug(struct kvm_debug_exit_arch *arch_info)
             }
         }
     } else if (kvm_find_sw_breakpoint(cpu_single_env, arch_info->pc)) {
-        handle = 1;
+        ret = EXCP_DEBUG;
     }
-    if (!handle) {
+    if (ret == 0) {
         cpu_synchronize_state(cpu_single_env);
         assert(cpu_single_env->exception_injected == -1);
 
+        /* pass to guest */
         cpu_single_env->exception_injected = arch_info->exception;
         cpu_single_env->has_error_code = 0;
     }
 
-    return handle;
+    return ret;
 }
 
 void kvm_arch_update_guest_debug(CPUState *env, struct kvm_guest_debug *dbg)
@@ -1851,6 +1852,12 @@ int kvm_arch_handle_exit(CPUState *env, struct kvm_run *run)
                 run->ex.exception, run->ex.error_code);
         ret = -1;
         break;
+#ifdef KVM_CAP_SET_GUEST_DEBUG
+    case KVM_EXIT_DEBUG:
+        DPRINTF("kvm_exit_debug\n");
+        ret = kvm_handle_debug(&run->debug.arch);
+        break;
+#endif /* KVM_CAP_SET_GUEST_DEBUG */
     default:
         fprintf(stderr, "KVM: unknown exit reason %d\n", run->exit_reason);
         ret = -1;
-- 
1.7.4


  parent reply	other threads:[~2011-03-15 22:04 UTC|newest]

Thread overview: 38+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-03-15 21:50 [PATCH 00/35] [PULL] qemu-kvm.git uq/master queue Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 01/35] kvm: ppc: Fix breakage of kvm_arch_pre_run/process_irqchip_events Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 02/35] kvm: Fix build warning when KVM_CAP_SET_GUEST_DEBUG is lacking Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 03/35] x86: Account for MCE in cpu_has_work Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 04/35] x86: Perform implicit mcg_status reset Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 05/35] x86: Small cleanups of MCE helpers Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 06/35] x86: Refine error reporting of MCE injection services Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 07/35] x86: Optionally avoid injecting AO MCEs while others are pending Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 08/35] Synchronize VCPU states before reset Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 09/35] kvm: x86: Move MCE functions together Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 10/35] kvm: Rename kvm_arch_process_irqchip_events to async_events Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 11/35] kvm: x86: Inject pending MCE events on state writeback Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 12/35] x86: Run qemu_inject_x86_mce on target VCPU Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 13/35] kvm: x86: Consolidate TCG and KVM MCE injection code Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 14/35] kvm: x86: Clean up kvm_setup_mce Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 15/35] kvm: x86: Fail kvm_arch_init_vcpu if MCE initialization fails Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 16/35] Add qemu_ram_remap Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 17/35] KVM, MCE, unpoison memory address across reboot Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 18/35] Implement qemu_kvm_eat_signals only for CONFIG_LINUX Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 19/35] x86: Unbreak TCG support for hardware breakpoints Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 20/35] s390: Detect invalid invocations of qemu_ram_free/remap Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 21/35] Break up user and system cpu_interrupt implementations Marcelo Tosatti
2011-03-16  9:02   ` Jan Kiszka
2011-03-16 20:13     ` Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 22/35] kvm: Add in-kernel irqchip awareness to cpu_thread_is_idle Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 23/35] kvm: x86: Do not leave halt if interrupts are disabled Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 24/35] kvm: Mark VCPU state dirty on creation Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 25/35] x86: Properly reset PAT MSR Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 26/35] x86: Save/restore " Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 27/35] kvm: x86: Synchronize PAT MSR with the kernel Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 28/35] kvm: Consider EXIT_DEBUG unknown without CAP_SET_GUEST_DEBUG Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 29/35] kvm: Keep KVM_RUN return value in separate variable Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 30/35] kvm: Reorder error handling of KVM_RUN Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 31/35] kvm: Rework inner loop of kvm_cpu_exec Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 32/35] kvm: Align kvm_arch_handle_exit to kvm_cpu_exec changes Marcelo Tosatti
2011-03-15 21:50 ` [PATCH 33/35] kvm: x86: Reorder functions in kvm.c Marcelo Tosatti
2011-03-15 21:50 ` Marcelo Tosatti [this message]
2011-03-15 21:50 ` [PATCH 35/35] Expose thread_id in info cpus Marcelo Tosatti

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c9cf861448b69c8acac566f9a3c25d5e593e36f6.1300225848.git.mtosatti@redhat.com \
    --to=mtosatti@redhat.com \
    --cc=aliguori@us.ibm.com \
    --cc=jan.kiszka@siemens.com \
    --cc=kvm@vger.kernel.org \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).