From: "K.Prasad" <prasad@linux.vnet.ibm.com>
To: Alan Stern <stern@rowland.harvard.edu>
Cc: Ingo Molnar <mingo@elte.hu>,
Linux Kernel Mailing List <linux-kernel@vger.kernel.org>,
Andrew Morton <akpm@linux-foundation.org>,
Benjamin Herrenschmidt <benh@au1.ibm.com>,
Frederic Weisbecker <fweisbec@gmail.com>,
Maneesh Soni <maneesh@in.ibm.com>,
Roland McGrath <roland@redhat.com>,
Steven Rostedt <rostedt@goodmis.org>
Subject: Re: [Patch 01/11] Introducing generic hardware breakpoint handler interfaces
Date: Tue, 24 Mar 2009 00:33:28 +0530 [thread overview]
Message-ID: <20090323190328.GA23426@in.ibm.com> (raw)
In-Reply-To: <Pine.LNX.4.44L0.0903211712040.27294-100000@netrider.rowland.org>
On Sat, Mar 21, 2009 at 05:39:59PM -0400, Alan Stern wrote:
> On Sat, 21 Mar 2009, K.Prasad wrote:
>
> > > > + * Kernel breakpoints grow downwards, starting from HB_NUM
> > > > + * 'hbkpt_kernel_pos' denotes lowest numbered breakpoint register occupied for
> > > > + * kernel-space request
> > > > + */
> > > > +unsigned int hbkpt_kernel_pos;
> > >
> > > This doesn't make much sense. All you need to know is which registers
> > > are in use; all others are available.
> > >
> >
> > As explained by Maneesh earlier, we compact the kernel-space requests
> > into registers (HB_NUM - 1) to hbkpt_kernel_pos. The kernel-space
> > requests aren't specific to any given register number too, and so
> > compaction would be suitable for this case (unlike when implemented for
> > user-space which might need virtualisation of registers).
>
> Okay, that makes sense. Perhaps you could add a short comment here
> explaining that the register allocations get compacted when a kernel
> breakpoint is unregistered, so they will always be contiguous.
>
> > > It's also a poor choice of name. Everywhere else (in my patches,
> > > anyway) the code refers to hardware breakpoints using the abbreviation
> > > "hwbp" or "hw_breakpoint". There's no reason suddenly to start using
> > > "hbkpt".
> > >
> >
> > I began using 'hbkpt' as a shorter naming convention (the longer one
> > being hw_breakpoint) without being really conscious of the 'hwbkpt'
> > usage by you (even some of the previous iterations contained them in
> > samples/hw_breakpoint and ftrace-plugin).
> >
> > Well, I will rename my shorter name to 'hwbkpt' for uniformity.
>
> My patch never used "hwbkpt". Besides "hw_breakpoint", it used only
> "bp". On going back and checking, I found that it didn't even use
> "hwbp". Some other abbreviations it did use were "kbp" for kernel
> breakpoint, "chbi" for per-CPU hardware breakpoint info, and "thbi" for
> per-thread hardware breakpoint info.
>
> If you're looking for a good short name, and if you want to keep
> hardware breakpoints distinct from software breakpoints, I suggest
> "hbp" instead of "hbkpt". But it's up to you, and it's worth noticing
> that the code already contains lots of variables named just "bp".
>
I am renaming all 'hbkpt' strings to 'hbp'.
> > > > +/* One higher than the highest counted user-space breakpoint register */
> > > > +unsigned int hbkpt_user_max;
> > >
> > > Likewise, this variable isn't really needed. It's just one more than
> > > the largest i such that hbkpt_user_max_refcount[i] > 0.
> > >
> >
> > It acts like a cache for determining the user-space breakpoint boundary.
> > It is used for sanity checks and in its absence we will have to compute from
> > hbkpt_user_max_refcount[] everytime.
>
> That's right. Isn't it simpler to check
>
> kernel_pos > 0 && hbkpt_user_refcount[kernel_pos - 1] == 0
>
> than to check
>
> kernel_pos - 1 >= hbkpt_user_max
>
> _and_ to keep hbkpt_user_max set to the correct value at all times?
>
Unfortunately the lines of code required to maintain the variable comes
close to the amount of lines it would potentially save. I will change to
code to compute it from hbkpt_user_refcount[] everytime.
> > > > +/*
> > > > + * Load the debug registers during startup of a CPU.
> > > > + */
> > > > +void load_debug_registers(void)
> > > > +{
> > > > + int i;
> > > > + unsigned long flags;
> > > > +
> > > > + /* Prevent IPIs for new kernel breakpoint updates */
> > > > + local_irq_save(flags);
> > > > +
> > > > + for (i = hbkpt_kernel_pos; i < HB_NUM; i++)
> > > > + if (hbkpt_kernel[i])
> > > > + on_each_cpu(arch_install_kernel_hbkpt,
> > > > + (void *)hbkpt_kernel[i], 0);
> > >
> > > This is completely wrong. First of all, it's dumb to send multiple
> > > IPIs (one for each iteration through the loop). Second, this routine
> > > shouldn't send any IPIs at all! It gets invoked when a CPU is
> > > starting up and wants to load its _own_ debug registers -- not tell
> > > another CPU to load anything.
> > >
> >
> > As I agreed before, it is an overkill (given the design of
> > arch_install_kernel_hbkpt()). I will create a new
> > arch_update_kernel_hbkpt(pos, bp) that will install breakpoints only
> > on the CPU starting up.
>
> Doesn't arch_install_kernel_hbkpt() already install breakpoints
> on only the current CPU? So why do you need a new function?
>
There will be a few more changes to arch_install_kernel_hbkpt() along
with this. Please find the changes in the ensuing patchset.
> > > > + /* Check that the virtual address is in the proper range */
> > > > + if (tsk) {
> > > > + if (!arch_check_va_in_userspace(bp->info.address, tsk))
> > > > + return -EFAULT;
> > > > + } else {
> > > > + if (!arch_check_va_in_kernelspace(bp->info.address))
> > > > + return -EFAULT;
> > > > + }
> > >
> > > Roland pointed out that these checks need to take into account the
> > > length of the breakpoint. For example, in
> > > arch_check_va_in_userspace() it isn't sufficient for the start of the
> > > breakpoint region to be a userspace address; the end of the
> > > breakpoint region must also be in userspace.
> > >
> >
> > Ok. Will do something like:
> > return (va <= (TASK_SIZE - (hw_breakpoint_length * word_size)));
>
> What is the purpose of word_size here? The breakpoint length should be
> specified in bytes, not words.
>
> Don't forget that that in arch_check_va_in_kernelspace() you need to
> check both for values that are too low and values that are too high
> (they overflow and wrap around back to a user address).
>
While I understand the user-space checking using the length of the HW
Breakpoint, I don't really see how I can check for an upper-bound for
kernel-space virtual addresses. Most usage in the kernel only checks for
the address >= TASK_SIZE (while they check for add + len if the length
of the memory is known). I will be glad to have any suggestions in this
regard.
> > We don't keep track of the thread (in the sense the task_struct) but
> > 'hbkpt_user_max' is used for validating requests and book-keeping. As
> > Maneesh mentioned before flush_thread_hw_breakpoint() updates
> > 'hbkpt_user_max'.
> >
> > I can change it to read like the one below if it sounds better to you.
> >
> > /*
> > * 'tsk' uses more number of registers than 'hbkpt_user_max'. Update
> > * the same.
> > */
>
> My preference is simply to eliminate hbkpt_user_max entirely.
>
> Alan Stern
>
Done.
Thanks,
K.Prasad
next prev parent reply other threads:[~2009-03-23 19:03 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20090319234044.410725944@K.Prasad>
2009-03-19 23:48 ` [Patch 01/11] Introducing generic hardware breakpoint handler interfaces K.Prasad
2009-03-20 14:33 ` Alan Stern
2009-03-20 18:30 ` Ingo Molnar
2009-03-21 17:32 ` K.Prasad
2009-03-20 18:32 ` Ingo Molnar
2009-03-21 17:26 ` K.Prasad
2009-03-21 21:39 ` Alan Stern
2009-03-23 19:03 ` K.Prasad [this message]
2009-03-23 19:21 ` Alan Stern
2009-03-23 20:42 ` K.Prasad
2009-03-23 21:20 ` Alan Stern
2009-03-19 23:48 ` [Patch 02/11] x86 architecture implementation of Hardware Breakpoint interfaces K.Prasad
2009-03-19 23:48 ` [Patch 03/11] Modifying generic debug exception to use thread-specific debug registers K.Prasad
2009-03-19 23:49 ` [Patch 04/11] Introduce user-space " K.Prasad
2009-03-19 23:49 ` [Patch 05/11] Use wrapper routines around debug registers in processor related functions K.Prasad
2009-03-19 23:49 ` [Patch 06/11] Use the new wrapper routines to access debug registers in process/thread code K.Prasad
2009-03-19 23:49 ` [Patch 07/11] Modify signal handling code to refrain from re-enabling HW Breakpoints K.Prasad
2009-03-19 23:49 ` [Patch 08/11] Modify Ptrace routines to access breakpoint registers K.Prasad
2009-03-19 23:49 ` [Patch 09/11] Cleanup HW Breakpoint registers before kexec K.Prasad
2009-03-19 23:50 ` [Patch 10/11] Sample HW breakpoint over kernel data address K.Prasad
2009-03-19 23:50 ` [Patch 11/11] ftrace plugin for kernel symbol tracing using HW Breakpoint interfaces - v2 K.Prasad
2009-03-20 9:04 ` Frederic Weisbecker
2009-03-21 16:24 ` K.Prasad
2009-03-21 16:39 ` Steven Rostedt
2009-03-23 19:08 ` K.Prasad
[not found] <20090324152028.754123712@K.Prasad>
2009-03-24 15:24 ` [Patch 01/11] Introducing generic hardware breakpoint handler interfaces K.Prasad
[not found] <20090307045120.039324630@linux.vnet.ibm.com>
2009-03-07 5:04 ` prasad
[not found] <20090305043440.189041194@linux.vnet.ibm.com>
2009-03-05 4:37 ` [patch " prasad
2009-03-10 13:50 ` Ingo Molnar
2009-03-10 14:19 ` Alan Stern
2009-03-10 14:50 ` Ingo Molnar
2009-03-11 12:57 ` K.Prasad
2009-03-11 13:35 ` Ingo Molnar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090323190328.GA23426@in.ibm.com \
--to=prasad@linux.vnet.ibm.com \
--cc=akpm@linux-foundation.org \
--cc=benh@au1.ibm.com \
--cc=fweisbec@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=maneesh@in.ibm.com \
--cc=mingo@elte.hu \
--cc=roland@redhat.com \
--cc=rostedt@goodmis.org \
--cc=stern@rowland.harvard.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox