From: Sergey Matyukevich <geomatsi@gmail.com>
To: Andrew Bresticker <abrestic@rivosinc.com>
Cc: linux-riscv@lists.infradead.org, linux-arch@vger.kernel.org,
Anup Patel <anup@brainfault.org>,
Atish Patra <atishp@rivosinc.com>,
Albert Ou <aou@eecs.berkeley.edu>,
Palmer Dabbelt <palmer@dabbelt.com>,
Paul Walmsley <paul.walmsley@sifive.com>,
Sergey Matyukevich <sergey.matyukevich@syntacore.com>
Subject: Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
Date: Sat, 5 Nov 2022 00:37:37 +0300 [thread overview]
Message-ID: <Y2WGIQ+m7jk5RPZv@curiosity> (raw)
In-Reply-To: <CALE4mHo2yFPpF68RvvDbKji6_peAX60_cXqnFMxydJTLjnLnUQ@mail.gmail.com>
Hi Andrew,
> > RISC-V Debug specification includes Sdtrig ISA extension. This extension
> > describes Trigger Module. Triggers can cause a breakpoint exception,
> > entry into Debug Mode, or a trace action without having to execute a
> > special instruction. For native debugging triggers can be used to
> > implement hardware breakpoints and watchpoints.
... [snip]
> > Despite missing userspace debug, initial implementation can be tested
> > on QEMU using kernel breakpoints, e.g. see samples/hw_breakpoint and
> > register_wide_hw_breakpoint. Hardware breakpoints work on upstream QEMU.
>
> We should also be able to enable the use of HW breakpoints (and
> watchpoints, modulo the issue mentioned below) in kdb, right?
Interesting. So far I didn't think about using hw breakpoints in kgdb.
I took a quick look at riscv and arm64 kgdb code. It looks like there
is nothing wrong in adding arch-specific implementation of the function
'kgdb_arch_set_breakpoint' that will use hw breakpoints if possible.
Besides it looks like in this case it makes sense to handle KGDB earlier
than hw breakpoints in do_trap_break.
> > However this is not the case for watchpoints since there is no way to
> > figure out which watchpoint is triggered. IIUC there are two possible
> > options for doing this: using 'hit' bit in tdata1 or reading faulting
> > virtual address from STVAL. QEMU implements neither of them. Current
> > implementation opts for STVAL. So the following experimental QEMU patch
> > is required to make watchpoints work:
> >
> > : diff --git a/target/riscv/cpu_helper.c b/target/riscv/cpu_helper.c
> > : index 278d163803..8858be7411 100644
> > : --- a/target/riscv/cpu_helper.c
> > : +++ b/target/riscv/cpu_helper.c
> > : @@ -1639,6 +1639,10 @@ void riscv_cpu_do_interrupt(CPUState *cs)
> > : case RISCV_EXCP_VIRT_INSTRUCTION_FAULT:
> > : tval = env->bins;
> > : break;
> > : + case RISCV_EXCP_BREAKPOINT:
> > : + tval = env->badaddr;
> > : + env->badaddr = 0x0;
> > : + break;
> > : default:
> > : break;
> > : }
> > : diff --git a/target/riscv/debug.c b/target/riscv/debug.c
> > : index 26ea764407..b4d1d566ab 100644
> > : --- a/target/riscv/debug.c
> > : +++ b/target/riscv/debug.c
> > : @@ -560,6 +560,7 @@ void riscv_cpu_debug_excp_handler(CPUState *cs)
> > :
> > : if (cs->watchpoint_hit) {
> > : if (cs->watchpoint_hit->flags & BP_CPU) {
> > : + env->badaddr = cs->watchpoint_hit->hitaddr;
> > : cs->watchpoint_hit = NULL;
> > : do_trigger_action(env, DBG_ACTION_BP);
> > : }
... [snip]
> > +int arch_install_hw_breakpoint(struct perf_event *bp)
> > +{
> > + struct arch_hw_breakpoint *info = counter_arch_bp(bp);
> > + struct sbi_dbtr_data_msg *xmit;
> > + struct sbi_dbtr_id_msg *recv;
> > + struct perf_event **slot;
> > + struct sbiret ret;
> > + int err = 0;
> > +
> > + xmit = kzalloc(SBI_MSG_SZ_ALIGN(sizeof(*xmit)), GFP_ATOMIC);
> > + if (!xmit) {
> > + err = -ENOMEM;
> > + goto out;
> > + }
> > +
> > + recv = kzalloc(SBI_MSG_SZ_ALIGN(sizeof(*recv)), GFP_ATOMIC);
> > + if (!recv) {
> > + err = -ENOMEM;
> > + goto out;
> > + }
>
> Do these really need to be dynamically allocated?
According to SBI extension proposal, base address of this memory chunk
must be 16-bytes aligned. To simplify things, buffer with 'power of two
bytes' size (and >= 16 bytes) is allocated. In this case alignment of
the kmalloc buffer is guaranteed to be at least this size. IIUC more
efforts are needed to guarantee such alignment for a buffer on stack.
> > +
> > + xmit->tdata1 = info->trig_data1.value;
> > + xmit->tdata2 = info->trig_data2;
> > + xmit->tdata3 = info->trig_data3;
> > +
> > + ret = sbi_ecall(SBI_EXT_DBTR, SBI_EXT_DBTR_TRIGGER_INSTALL,
> > + 1, __pa(xmit) >> 4, __pa(recv) >> 4,
> > + 0, 0, 0);
> > + if (ret.error) {
> > + pr_warn("%s: failed to install trigger\n", __func__);
> > + err = -EIO;
> > + goto out;
> > + }
> > +
> > + if (recv->idx >= dbtr_total_num) {
> > + pr_warn("%s: invalid trigger index %lu\n", __func__, recv->idx);
> > + err = -EINVAL;
> > + goto out;
> > + }
> > +
> > + slot = this_cpu_ptr(&bp_per_reg[recv->idx]);
> > + if (*slot) {
> > + pr_warn("%s: slot %lu is in use\n", __func__, recv->idx);
> > + err = -EBUSY;
> > + goto out;
> > + }
> > +
> > + *slot = bp;
> > +
> > +out:
> > + kfree(xmit);
> > + kfree(recv);
> > +
> > + return err;
> > +}
... [snip]
> > +static int __init arch_hw_breakpoint_init(void)
> > +{
> > + union riscv_dbtr_tdata1 tdata1;
> > + struct sbiret ret;
> > +
> > + if (sbi_probe_extension(SBI_EXT_DBTR) <= 0) {
> > + pr_info("%s: SBI_EXT_DBTR is not supported\n", __func__);
> > + return 0;
> > + }
> > +
> > + ret = sbi_ecall(SBI_EXT_DBTR, SBI_EXT_DBTR_NUM_TRIGGERS,
> > + 0, 0, 0, 0, 0, 0);
> > + if (ret.error) {
> > + pr_warn("%s: failed to detect triggers\n", __func__);
> > + return 0;
> > + }
> > +
> > + pr_info("%s: total number of triggers: %lu\n", __func__, ret.value);
> > +
> > + tdata1.value = 0;
> > + tdata1.type = RISCV_DBTR_TRIG_MCONTROL6;
> > +
> > + ret = sbi_ecall(SBI_EXT_DBTR, SBI_EXT_DBTR_NUM_TRIGGERS,
> > + tdata1.value, 0, 0, 0, 0, 0);
> > + if (ret.error) {
> > + pr_warn("%s: failed to detect triggers\n", __func__);
> > + dbtr_total_num = 0;
> > + return 0;
> > + }
>
> nit: This is basically identical to hw_breakpoint_slots() -- just call
> it here, or perhaps pull the DBTR_NUM_TRIGGERS ECALL into its own
> function to reduce the duplication, e.g. 'dbtr_num_triggers(unsigned
> long type)'?
Good point. More similar requests will be added, e.g. for MCONTROL and
possibly other trigger types. So I will add a separate
'dbtr_num_triggers' function.
> > +
> > + pr_info("%s: total number of type %d triggers: %lu\n",
> > + __func__, tdata1.type, ret.value);
> > +
> > + dbtr_total_num = ret.value;
> > +
> > + return 0;
> > +}
Thanks!
Sergey
next prev parent reply other threads:[~2022-11-04 21:38 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-10-31 21:32 [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints Sergey Matyukevich
2022-11-01 21:23 ` Andrew Bresticker
2022-11-04 21:37 ` Sergey Matyukevich [this message]
2022-11-05 9:10 ` Anup Patel
2022-11-07 14:32 ` Andrew Bresticker
2022-11-07 16:05 ` Anup Patel
2022-11-07 17:24 ` Andrew Bresticker
2022-11-07 17:49 ` Anup Patel
2022-11-07 20:52 ` Sergey Matyukevich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y2WGIQ+m7jk5RPZv@curiosity \
--to=geomatsi@gmail.com \
--cc=abrestic@rivosinc.com \
--cc=anup@brainfault.org \
--cc=aou@eecs.berkeley.edu \
--cc=atishp@rivosinc.com \
--cc=linux-arch@vger.kernel.org \
--cc=linux-riscv@lists.infradead.org \
--cc=palmer@dabbelt.com \
--cc=paul.walmsley@sifive.com \
--cc=sergey.matyukevich@syntacore.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox