From: Andy Chiu <andy.chiu@sifive.com>
To: "Maciej W. Rozycki" <macro@orcam.me.uk>
Cc: Greg Savin <greg.savin@sifive.com>,
Greentime Hu <greentime.hu@sifive.com>,
linux-riscv@lists.infradead.org, gdb-patches@sourceware.org,
Andrew Burgess <andrew.burgess@embecosm.com>
Subject: Re: [PATCH] RISC-V: support for vector register accesses via ptrace() in RISC-V Linux native
Date: Thu, 10 Aug 2023 10:35:11 +0000 [thread overview]
Message-ID: <20230810103510.GA2509@hsinchu26> (raw)
In-Reply-To: <alpine.DEB.2.21.2308092247280.25915@angie.orcam.me.uk>
On Thu, Aug 10, 2023 at 12:09:17AM +0100, Maciej W. Rozycki wrote:
> On Wed, 9 Aug 2023, Greg Savin wrote:
>
> > The SIGILL guard is being used as a wrapper around determination of the
> > VLENB CSR, which is not part of the ptrace() payload for vector registers,
> > at least as it exists at head-of-tree Linux kernel. GDB or gdbserver
> > needs to know VLENB in order to construct the architectural feature
> > metadata that reports an accurate width for the vector registers. If not
> > for the VLENB determination specifically, and the lack of this information
> > via ptrace(), then there would be no motivation for executing a vector
> > instruction directly. It's a workaround, basically. I guess I could
> > inquire in Linux kernel land regarding whether the NT_RISCV_VECTOR ptrace()
> > payload could be enhanced to provide VLENB.
>
> I think the kernel interface needs to be clarified first, before we can
> proceed with the tools side.
>
> I can see the vector state is carried in a REGSET_V regset, which in turn
> corresponds to an NT_RISCV_VECTOR core file note. I can see that besides
> the vector data registers only the VSTART, VL, VTYPE, and VCSR vector CSRs
> are provided in that regset, and that vector data registers are assigned
> a contiguous space of (32 * RISCV_MAX_VLENB) bytes rather than individual
> slots.
>
> So how are we supposed to determine the width of the vector registers
> recorded in a core file? I'd say the RISC-V/Linux kernel regset API is
> incomplete.
Does it make sense to you if we encapsulate this with a hwprobe syscall?
e.g provide a hwprobe entry to get system's VLENB. We will have to
increase and rearrange the buffer for NT_RISCV_VECTOR if we want to use
ptrace as the entry point for this purpose. I am not very sure if it'd be
too late to do though.
>
> A complete API has to provide `ptrace' and core file access to all the
> relevant registers (vector registers in this case) that can be accessed by
> machine instructions by the debuggee. That includes read-only registers,
> writes to which via `ptrace' will of course be ignored. If a register is
> a shadow only and can be reconstructed from another, canonical register
> (e.g. VXRM vs VCSR) then the shadow register can (and best be) omitted of
> course. Additional artificial OS registers may also have to be provided
> that reflect the relevant privileged state made available to the debuggee
> at run time by OS calls such as prctl(2); this for example might be a mode
> setting which affects the hardware interpretation of a register set that
> debug tools may need to take into account or the person debugging may want
> to check or modify (e.g. REGSET_FP_MODE in the MIPS/Linux port).
>
> I've added the authors of the Linux kernel code and the RISC-V/Linux
> mailing list to the list of recipients. Am I missing anything here?
>
> Maciej
Andy
_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv
next prev parent reply other threads:[~2023-08-10 10:35 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20230803230110.904724-1-greg.savin@sifive.com>
[not found] ` <alpine.DEB.2.21.2308091008500.25915@angie.orcam.me.uk>
[not found] ` <CADdv1FqjLPZ-eWOKPv0uZxF-u-SYjn0WJGr3KWW9H06-O0L35w@mail.gmail.com>
2023-08-09 23:09 ` [PATCH] RISC-V: support for vector register accesses via ptrace() in RISC-V Linux native Maciej W. Rozycki
2023-08-10 10:35 ` Andy Chiu [this message]
2023-08-10 11:40 ` Maciej W. Rozycki
2023-08-10 13:55 ` Maciej W. Rozycki
2023-08-10 17:23 ` Andy Chiu
2023-08-10 21:08 ` Palmer Dabbelt
2023-08-10 21:21 ` Maciej W. Rozycki
2023-08-11 11:28 ` Andy Chiu
2023-08-10 14:05 ` Andy Chiu
2023-08-10 20:51 ` Maciej W. Rozycki
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230810103510.GA2509@hsinchu26 \
--to=andy.chiu@sifive.com \
--cc=andrew.burgess@embecosm.com \
--cc=gdb-patches@sourceware.org \
--cc=greentime.hu@sifive.com \
--cc=greg.savin@sifive.com \
--cc=linux-riscv@lists.infradead.org \
--cc=macro@orcam.me.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox