]>
Commit | Line | Data |
---|---|---|
26861c7c MH |
1 | /* |
2 | * ARM implementation of KVM hooks, 64 bit specific code | |
3 | * | |
4 | * Copyright Mian-M. Hamayun 2013, Virtual Open Systems | |
e4482ab7 | 5 | * Copyright Alex Bennée 2014, Linaro |
26861c7c MH |
6 | * |
7 | * This work is licensed under the terms of the GNU GPL, version 2 or later. | |
8 | * See the COPYING file in the top-level directory. | |
9 | * | |
10 | */ | |
11 | ||
74c21bd0 | 12 | #include "qemu/osdep.h" |
26861c7c | 13 | #include <sys/ioctl.h> |
e4482ab7 | 14 | #include <sys/ptrace.h> |
26861c7c | 15 | |
e4482ab7 | 16 | #include <linux/elf.h> |
26861c7c MH |
17 | #include <linux/kvm.h> |
18 | ||
19 | #include "qemu-common.h" | |
33c11879 | 20 | #include "cpu.h" |
26861c7c | 21 | #include "qemu/timer.h" |
2ecb2027 | 22 | #include "qemu/error-report.h" |
e4482ab7 AB |
23 | #include "qemu/host-utils.h" |
24 | #include "exec/gdbstub.h" | |
26861c7c MH |
25 | #include "sysemu/sysemu.h" |
26 | #include "sysemu/kvm.h" | |
27 | #include "kvm_arm.h" | |
9208b961 | 28 | #include "internals.h" |
26861c7c MH |
29 | #include "hw/arm/arm.h" |
30 | ||
29eb3d9a AB |
31 | static bool have_guest_debug; |
32 | ||
e4482ab7 AB |
33 | /* |
34 | * Although the ARM implementation of hardware assisted debugging | |
35 | * allows for different breakpoints per-core, the current GDB | |
36 | * interface treats them as a global pool of registers (which seems to | |
37 | * be the case for x86, ppc and s390). As a result we store one copy | |
38 | * of registers which is used for all active cores. | |
39 | * | |
40 | * Write access is serialised by virtue of the GDB protocol which | |
41 | * updates things. Read access (i.e. when the values are copied to the | |
42 | * vCPU) is also gated by GDB's run control. | |
43 | * | |
44 | * This is not unreasonable as most of the time debugging kernels you | |
45 | * never know which core will eventually execute your function. | |
46 | */ | |
47 | ||
48 | typedef struct { | |
49 | uint64_t bcr; | |
50 | uint64_t bvr; | |
51 | } HWBreakpoint; | |
52 | ||
53 | /* The watchpoint registers can cover more area than the requested | |
54 | * watchpoint so we need to store the additional information | |
55 | * somewhere. We also need to supply a CPUWatchpoint to the GDB stub | |
56 | * when the watchpoint is hit. | |
57 | */ | |
58 | typedef struct { | |
59 | uint64_t wcr; | |
60 | uint64_t wvr; | |
61 | CPUWatchpoint details; | |
62 | } HWWatchpoint; | |
63 | ||
64 | /* Maximum and current break/watch point counts */ | |
65 | int max_hw_bps, max_hw_wps; | |
66 | GArray *hw_breakpoints, *hw_watchpoints; | |
67 | ||
68 | #define cur_hw_wps (hw_watchpoints->len) | |
69 | #define cur_hw_bps (hw_breakpoints->len) | |
70 | #define get_hw_bp(i) (&g_array_index(hw_breakpoints, HWBreakpoint, i)) | |
71 | #define get_hw_wp(i) (&g_array_index(hw_watchpoints, HWWatchpoint, i)) | |
72 | ||
29eb3d9a | 73 | /** |
e4482ab7 | 74 | * kvm_arm_init_debug() - check for guest debug capabilities |
29eb3d9a AB |
75 | * @cs: CPUState |
76 | * | |
e4482ab7 AB |
77 | * kvm_check_extension returns the number of debug registers we have |
78 | * or 0 if we have none. | |
29eb3d9a AB |
79 | * |
80 | */ | |
81 | static void kvm_arm_init_debug(CPUState *cs) | |
82 | { | |
83 | have_guest_debug = kvm_check_extension(cs->kvm_state, | |
84 | KVM_CAP_SET_GUEST_DEBUG); | |
e4482ab7 AB |
85 | |
86 | max_hw_wps = kvm_check_extension(cs->kvm_state, KVM_CAP_GUEST_DEBUG_HW_WPS); | |
87 | hw_watchpoints = g_array_sized_new(true, true, | |
88 | sizeof(HWWatchpoint), max_hw_wps); | |
89 | ||
90 | max_hw_bps = kvm_check_extension(cs->kvm_state, KVM_CAP_GUEST_DEBUG_HW_BPS); | |
91 | hw_breakpoints = g_array_sized_new(true, true, | |
92 | sizeof(HWBreakpoint), max_hw_bps); | |
29eb3d9a AB |
93 | return; |
94 | } | |
95 | ||
e4482ab7 AB |
96 | /** |
97 | * insert_hw_breakpoint() | |
98 | * @addr: address of breakpoint | |
99 | * | |
100 | * See ARM ARM D2.9.1 for details but here we are only going to create | |
101 | * simple un-linked breakpoints (i.e. we don't chain breakpoints | |
102 | * together to match address and context or vmid). The hardware is | |
103 | * capable of fancier matching but that will require exposing that | |
104 | * fanciness to GDB's interface | |
105 | * | |
864df205 | 106 | * DBGBCR<n>_EL1, Debug Breakpoint Control Registers |
e4482ab7 AB |
107 | * |
108 | * 31 24 23 20 19 16 15 14 13 12 9 8 5 4 3 2 1 0 | |
109 | * +------+------+-------+-----+----+------+-----+------+-----+---+ | |
110 | * | RES0 | BT | LBN | SSC | HMC| RES0 | BAS | RES0 | PMC | E | | |
111 | * +------+------+-------+-----+----+------+-----+------+-----+---+ | |
112 | * | |
113 | * BT: Breakpoint type (0 = unlinked address match) | |
114 | * LBN: Linked BP number (0 = unused) | |
115 | * SSC/HMC/PMC: Security, Higher and Priv access control (Table D-12) | |
116 | * BAS: Byte Address Select (RES1 for AArch64) | |
117 | * E: Enable bit | |
864df205 AB |
118 | * |
119 | * DBGBVR<n>_EL1, Debug Breakpoint Value Registers | |
120 | * | |
121 | * 63 53 52 49 48 2 1 0 | |
122 | * +------+-----------+----------+-----+ | |
123 | * | RESS | VA[52:49] | VA[48:2] | 0 0 | | |
124 | * +------+-----------+----------+-----+ | |
125 | * | |
126 | * Depending on the addressing mode bits the top bits of the register | |
127 | * are a sign extension of the highest applicable VA bit. Some | |
128 | * versions of GDB don't do it correctly so we ensure they are correct | |
129 | * here so future PC comparisons will work properly. | |
e4482ab7 | 130 | */ |
864df205 | 131 | |
e4482ab7 AB |
132 | static int insert_hw_breakpoint(target_ulong addr) |
133 | { | |
134 | HWBreakpoint brk = { | |
135 | .bcr = 0x1, /* BCR E=1, enable */ | |
864df205 | 136 | .bvr = sextract64(addr, 0, 53) |
e4482ab7 AB |
137 | }; |
138 | ||
139 | if (cur_hw_bps >= max_hw_bps) { | |
140 | return -ENOBUFS; | |
141 | } | |
142 | ||
143 | brk.bcr = deposit32(brk.bcr, 1, 2, 0x3); /* PMC = 11 */ | |
144 | brk.bcr = deposit32(brk.bcr, 5, 4, 0xf); /* BAS = RES1 */ | |
145 | ||
146 | g_array_append_val(hw_breakpoints, brk); | |
147 | ||
148 | return 0; | |
149 | } | |
150 | ||
151 | /** | |
152 | * delete_hw_breakpoint() | |
153 | * @pc: address of breakpoint | |
154 | * | |
155 | * Delete a breakpoint and shuffle any above down | |
156 | */ | |
157 | ||
158 | static int delete_hw_breakpoint(target_ulong pc) | |
159 | { | |
160 | int i; | |
161 | for (i = 0; i < hw_breakpoints->len; i++) { | |
162 | HWBreakpoint *brk = get_hw_bp(i); | |
163 | if (brk->bvr == pc) { | |
164 | g_array_remove_index(hw_breakpoints, i); | |
165 | return 0; | |
166 | } | |
167 | } | |
168 | return -ENOENT; | |
169 | } | |
170 | ||
171 | /** | |
172 | * insert_hw_watchpoint() | |
173 | * @addr: address of watch point | |
174 | * @len: size of area | |
175 | * @type: type of watch point | |
176 | * | |
177 | * See ARM ARM D2.10. As with the breakpoints we can do some advanced | |
178 | * stuff if we want to. The watch points can be linked with the break | |
179 | * points above to make them context aware. However for simplicity | |
180 | * currently we only deal with simple read/write watch points. | |
181 | * | |
182 | * D7.3.11 DBGWCR<n>_EL1, Debug Watchpoint Control Registers | |
183 | * | |
184 | * 31 29 28 24 23 21 20 19 16 15 14 13 12 5 4 3 2 1 0 | |
185 | * +------+-------+------+----+-----+-----+-----+-----+-----+-----+---+ | |
186 | * | RES0 | MASK | RES0 | WT | LBN | SSC | HMC | BAS | LSC | PAC | E | | |
187 | * +------+-------+------+----+-----+-----+-----+-----+-----+-----+---+ | |
188 | * | |
189 | * MASK: num bits addr mask (0=none,01/10=res,11=3 bits (8 bytes)) | |
190 | * WT: 0 - unlinked, 1 - linked (not currently used) | |
191 | * LBN: Linked BP number (not currently used) | |
192 | * SSC/HMC/PAC: Security, Higher and Priv access control (Table D2-11) | |
193 | * BAS: Byte Address Select | |
194 | * LSC: Load/Store control (01: load, 10: store, 11: both) | |
195 | * E: Enable | |
196 | * | |
197 | * The bottom 2 bits of the value register are masked. Therefore to | |
198 | * break on any sizes smaller than an unaligned word you need to set | |
199 | * MASK=0, BAS=bit per byte in question. For larger regions (^2) you | |
200 | * need to ensure you mask the address as required and set BAS=0xff | |
201 | */ | |
202 | ||
203 | static int insert_hw_watchpoint(target_ulong addr, | |
204 | target_ulong len, int type) | |
205 | { | |
206 | HWWatchpoint wp = { | |
207 | .wcr = 1, /* E=1, enable */ | |
208 | .wvr = addr & (~0x7ULL), | |
209 | .details = { .vaddr = addr, .len = len } | |
210 | }; | |
211 | ||
212 | if (cur_hw_wps >= max_hw_wps) { | |
213 | return -ENOBUFS; | |
214 | } | |
215 | ||
216 | /* | |
217 | * HMC=0 SSC=0 PAC=3 will hit EL0 or EL1, any security state, | |
218 | * valid whether EL3 is implemented or not | |
219 | */ | |
220 | wp.wcr = deposit32(wp.wcr, 1, 2, 3); | |
221 | ||
222 | switch (type) { | |
223 | case GDB_WATCHPOINT_READ: | |
224 | wp.wcr = deposit32(wp.wcr, 3, 2, 1); | |
225 | wp.details.flags = BP_MEM_READ; | |
226 | break; | |
227 | case GDB_WATCHPOINT_WRITE: | |
228 | wp.wcr = deposit32(wp.wcr, 3, 2, 2); | |
229 | wp.details.flags = BP_MEM_WRITE; | |
230 | break; | |
231 | case GDB_WATCHPOINT_ACCESS: | |
232 | wp.wcr = deposit32(wp.wcr, 3, 2, 3); | |
233 | wp.details.flags = BP_MEM_ACCESS; | |
234 | break; | |
235 | default: | |
236 | g_assert_not_reached(); | |
237 | break; | |
238 | } | |
239 | if (len <= 8) { | |
240 | /* we align the address and set the bits in BAS */ | |
241 | int off = addr & 0x7; | |
242 | int bas = (1 << len) - 1; | |
243 | ||
244 | wp.wcr = deposit32(wp.wcr, 5 + off, 8 - off, bas); | |
245 | } else { | |
246 | /* For ranges above 8 bytes we need to be a power of 2 */ | |
247 | if (is_power_of_2(len)) { | |
248 | int bits = ctz64(len); | |
249 | ||
250 | wp.wvr &= ~((1 << bits) - 1); | |
251 | wp.wcr = deposit32(wp.wcr, 24, 4, bits); | |
252 | wp.wcr = deposit32(wp.wcr, 5, 8, 0xff); | |
253 | } else { | |
254 | return -ENOBUFS; | |
255 | } | |
256 | } | |
257 | ||
258 | g_array_append_val(hw_watchpoints, wp); | |
259 | return 0; | |
260 | } | |
261 | ||
262 | ||
263 | static bool check_watchpoint_in_range(int i, target_ulong addr) | |
264 | { | |
265 | HWWatchpoint *wp = get_hw_wp(i); | |
266 | uint64_t addr_top, addr_bottom = wp->wvr; | |
267 | int bas = extract32(wp->wcr, 5, 8); | |
268 | int mask = extract32(wp->wcr, 24, 4); | |
269 | ||
270 | if (mask) { | |
271 | addr_top = addr_bottom + (1 << mask); | |
272 | } else { | |
273 | /* BAS must be contiguous but can offset against the base | |
274 | * address in DBGWVR */ | |
275 | addr_bottom = addr_bottom + ctz32(bas); | |
276 | addr_top = addr_bottom + clo32(bas); | |
277 | } | |
278 | ||
279 | if (addr >= addr_bottom && addr <= addr_top) { | |
280 | return true; | |
281 | } | |
282 | ||
283 | return false; | |
284 | } | |
285 | ||
286 | /** | |
287 | * delete_hw_watchpoint() | |
288 | * @addr: address of breakpoint | |
289 | * | |
290 | * Delete a breakpoint and shuffle any above down | |
291 | */ | |
292 | ||
293 | static int delete_hw_watchpoint(target_ulong addr, | |
294 | target_ulong len, int type) | |
295 | { | |
296 | int i; | |
297 | for (i = 0; i < cur_hw_wps; i++) { | |
298 | if (check_watchpoint_in_range(i, addr)) { | |
299 | g_array_remove_index(hw_watchpoints, i); | |
300 | return 0; | |
301 | } | |
302 | } | |
303 | return -ENOENT; | |
304 | } | |
305 | ||
306 | ||
307 | int kvm_arch_insert_hw_breakpoint(target_ulong addr, | |
308 | target_ulong len, int type) | |
309 | { | |
310 | switch (type) { | |
311 | case GDB_BREAKPOINT_HW: | |
312 | return insert_hw_breakpoint(addr); | |
313 | break; | |
314 | case GDB_WATCHPOINT_READ: | |
315 | case GDB_WATCHPOINT_WRITE: | |
316 | case GDB_WATCHPOINT_ACCESS: | |
317 | return insert_hw_watchpoint(addr, len, type); | |
318 | default: | |
319 | return -ENOSYS; | |
320 | } | |
321 | } | |
322 | ||
323 | int kvm_arch_remove_hw_breakpoint(target_ulong addr, | |
324 | target_ulong len, int type) | |
325 | { | |
326 | switch (type) { | |
327 | case GDB_BREAKPOINT_HW: | |
328 | return delete_hw_breakpoint(addr); | |
329 | break; | |
330 | case GDB_WATCHPOINT_READ: | |
331 | case GDB_WATCHPOINT_WRITE: | |
332 | case GDB_WATCHPOINT_ACCESS: | |
333 | return delete_hw_watchpoint(addr, len, type); | |
334 | default: | |
335 | return -ENOSYS; | |
336 | } | |
337 | } | |
338 | ||
339 | ||
340 | void kvm_arch_remove_all_hw_breakpoints(void) | |
341 | { | |
342 | if (cur_hw_wps > 0) { | |
343 | g_array_remove_range(hw_watchpoints, 0, cur_hw_wps); | |
344 | } | |
345 | if (cur_hw_bps > 0) { | |
346 | g_array_remove_range(hw_breakpoints, 0, cur_hw_bps); | |
347 | } | |
348 | } | |
349 | ||
350 | void kvm_arm_copy_hw_debug_data(struct kvm_guest_debug_arch *ptr) | |
351 | { | |
352 | int i; | |
353 | memset(ptr, 0, sizeof(struct kvm_guest_debug_arch)); | |
354 | ||
355 | for (i = 0; i < max_hw_wps; i++) { | |
356 | HWWatchpoint *wp = get_hw_wp(i); | |
357 | ptr->dbg_wcr[i] = wp->wcr; | |
358 | ptr->dbg_wvr[i] = wp->wvr; | |
359 | } | |
360 | for (i = 0; i < max_hw_bps; i++) { | |
361 | HWBreakpoint *bp = get_hw_bp(i); | |
362 | ptr->dbg_bcr[i] = bp->bcr; | |
363 | ptr->dbg_bvr[i] = bp->bvr; | |
364 | } | |
365 | } | |
366 | ||
367 | bool kvm_arm_hw_debug_active(CPUState *cs) | |
368 | { | |
369 | return ((cur_hw_wps > 0) || (cur_hw_bps > 0)); | |
370 | } | |
371 | ||
372 | static bool find_hw_breakpoint(CPUState *cpu, target_ulong pc) | |
373 | { | |
374 | int i; | |
375 | ||
376 | for (i = 0; i < cur_hw_bps; i++) { | |
377 | HWBreakpoint *bp = get_hw_bp(i); | |
378 | if (bp->bvr == pc) { | |
379 | return true; | |
380 | } | |
381 | } | |
382 | return false; | |
383 | } | |
384 | ||
385 | static CPUWatchpoint *find_hw_watchpoint(CPUState *cpu, target_ulong addr) | |
386 | { | |
387 | int i; | |
388 | ||
389 | for (i = 0; i < cur_hw_wps; i++) { | |
390 | if (check_watchpoint_in_range(i, addr)) { | |
391 | return &get_hw_wp(i)->details; | |
392 | } | |
393 | } | |
394 | return NULL; | |
395 | } | |
396 | ||
3f07cb2a | 397 | static bool kvm_arm_pmu_set_attr(CPUState *cs, struct kvm_device_attr *attr) |
01fe6b60 SZ |
398 | { |
399 | int err; | |
400 | ||
3f07cb2a AJ |
401 | err = kvm_vcpu_ioctl(cs, KVM_HAS_DEVICE_ATTR, attr); |
402 | if (err != 0) { | |
b2bfe9f7 | 403 | error_report("PMU: KVM_HAS_DEVICE_ATTR: %s", strerror(-err)); |
3f07cb2a | 404 | return false; |
01fe6b60 SZ |
405 | } |
406 | ||
3f07cb2a | 407 | err = kvm_vcpu_ioctl(cs, KVM_SET_DEVICE_ATTR, attr); |
b2bfe9f7 AJ |
408 | if (err != 0) { |
409 | error_report("PMU: KVM_SET_DEVICE_ATTR: %s", strerror(-err)); | |
410 | return false; | |
01fe6b60 SZ |
411 | } |
412 | ||
3f07cb2a AJ |
413 | return true; |
414 | } | |
01fe6b60 | 415 | |
b2bfe9f7 | 416 | void kvm_arm_pmu_init(CPUState *cs) |
3f07cb2a AJ |
417 | { |
418 | struct kvm_device_attr attr = { | |
419 | .group = KVM_ARM_VCPU_PMU_V3_CTRL, | |
420 | .attr = KVM_ARM_VCPU_PMU_V3_INIT, | |
421 | }; | |
422 | ||
b2bfe9f7 AJ |
423 | if (!ARM_CPU(cs)->has_pmu) { |
424 | return; | |
425 | } | |
426 | if (!kvm_arm_pmu_set_attr(cs, &attr)) { | |
427 | error_report("failed to init PMU"); | |
428 | abort(); | |
429 | } | |
3f07cb2a AJ |
430 | } |
431 | ||
b2bfe9f7 | 432 | void kvm_arm_pmu_set_irq(CPUState *cs, int irq) |
3f07cb2a AJ |
433 | { |
434 | struct kvm_device_attr attr = { | |
435 | .group = KVM_ARM_VCPU_PMU_V3_CTRL, | |
436 | .addr = (intptr_t)&irq, | |
437 | .attr = KVM_ARM_VCPU_PMU_V3_IRQ, | |
438 | }; | |
01fe6b60 | 439 | |
b2bfe9f7 AJ |
440 | if (!ARM_CPU(cs)->has_pmu) { |
441 | return; | |
442 | } | |
443 | if (!kvm_arm_pmu_set_attr(cs, &attr)) { | |
444 | error_report("failed to set irq for PMU"); | |
445 | abort(); | |
446 | } | |
01fe6b60 | 447 | } |
e4482ab7 | 448 | |
26861c7c MH |
449 | static inline void set_feature(uint64_t *features, int feature) |
450 | { | |
451 | *features |= 1ULL << feature; | |
452 | } | |
453 | ||
929e754d WH |
454 | static inline void unset_feature(uint64_t *features, int feature) |
455 | { | |
456 | *features &= ~(1ULL << feature); | |
457 | } | |
458 | ||
9d60dea9 RH |
459 | static int read_sys_reg32(int fd, uint32_t *pret, uint64_t id) |
460 | { | |
461 | uint64_t ret; | |
462 | struct kvm_one_reg idreg = { .id = id, .addr = (uintptr_t)&ret }; | |
463 | int err; | |
464 | ||
465 | assert((id & KVM_REG_SIZE_MASK) == KVM_REG_SIZE_U64); | |
466 | err = ioctl(fd, KVM_GET_ONE_REG, &idreg); | |
467 | if (err < 0) { | |
468 | return -1; | |
469 | } | |
470 | *pret = ret; | |
471 | return 0; | |
472 | } | |
473 | ||
474 | static int read_sys_reg64(int fd, uint64_t *pret, uint64_t id) | |
475 | { | |
476 | struct kvm_one_reg idreg = { .id = id, .addr = (uintptr_t)pret }; | |
477 | ||
478 | assert((id & KVM_REG_SIZE_MASK) == KVM_REG_SIZE_U64); | |
479 | return ioctl(fd, KVM_GET_ONE_REG, &idreg); | |
480 | } | |
481 | ||
c4487d76 | 482 | bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf) |
26861c7c MH |
483 | { |
484 | /* Identify the feature bits corresponding to the host CPU, and | |
485 | * fill out the ARMHostCPUClass fields accordingly. To do this | |
486 | * we have to create a scratch VM, create a single CPU inside it, | |
487 | * and then query that CPU for the relevant ID registers. | |
26861c7c MH |
488 | */ |
489 | int fdarray[3]; | |
490 | uint64_t features = 0; | |
9d60dea9 RH |
491 | int err; |
492 | ||
26861c7c MH |
493 | /* Old kernels may not know about the PREFERRED_TARGET ioctl: however |
494 | * we know these will only support creating one kind of guest CPU, | |
495 | * which is its preferred CPU type. Fortunately these old kernels | |
496 | * support only a very limited number of CPUs. | |
497 | */ | |
498 | static const uint32_t cpus_to_try[] = { | |
499 | KVM_ARM_TARGET_AEM_V8, | |
500 | KVM_ARM_TARGET_FOUNDATION_V8, | |
501 | KVM_ARM_TARGET_CORTEX_A57, | |
502 | QEMU_KVM_ARM_TARGET_NONE | |
503 | }; | |
504 | struct kvm_vcpu_init init; | |
505 | ||
506 | if (!kvm_arm_create_scratch_host_vcpu(cpus_to_try, fdarray, &init)) { | |
507 | return false; | |
508 | } | |
509 | ||
c4487d76 PM |
510 | ahcf->target = init.target; |
511 | ahcf->dtb_compatible = "arm,arm-v8"; | |
26861c7c | 512 | |
9d60dea9 RH |
513 | err = read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64pfr0, |
514 | ARM64_SYS_REG(3, 0, 0, 4, 0)); | |
515 | if (unlikely(err < 0)) { | |
516 | /* | |
517 | * Before v4.15, the kernel only exposed a limited number of system | |
518 | * registers, not including any of the interesting AArch64 ID regs. | |
519 | * For the most part we could leave these fields as zero with minimal | |
520 | * effect, since this does not affect the values seen by the guest. | |
521 | * | |
522 | * However, it could cause problems down the line for QEMU, | |
523 | * so provide a minimal v8.0 default. | |
524 | * | |
525 | * ??? Could read MIDR and use knowledge from cpu64.c. | |
526 | * ??? Could map a page of memory into our temp guest and | |
527 | * run the tiniest of hand-crafted kernels to extract | |
528 | * the values seen by the guest. | |
529 | * ??? Either of these sounds like too much effort just | |
530 | * to work around running a modern host kernel. | |
531 | */ | |
532 | ahcf->isar.id_aa64pfr0 = 0x00000011; /* EL1&0, AArch64 only */ | |
533 | err = 0; | |
534 | } else { | |
535 | err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64pfr1, | |
536 | ARM64_SYS_REG(3, 0, 0, 4, 1)); | |
537 | err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64isar0, | |
538 | ARM64_SYS_REG(3, 0, 0, 6, 0)); | |
539 | err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64isar1, | |
540 | ARM64_SYS_REG(3, 0, 0, 6, 1)); | |
541 | ||
542 | /* | |
543 | * Note that if AArch32 support is not present in the host, | |
544 | * the AArch32 sysregs are present to be read, but will | |
545 | * return UNKNOWN values. This is neither better nor worse | |
546 | * than skipping the reads and leaving 0, as we must avoid | |
547 | * considering the values in every case. | |
548 | */ | |
549 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar0, | |
550 | ARM64_SYS_REG(3, 0, 0, 2, 0)); | |
551 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar1, | |
552 | ARM64_SYS_REG(3, 0, 0, 2, 1)); | |
553 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar2, | |
554 | ARM64_SYS_REG(3, 0, 0, 2, 2)); | |
555 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar3, | |
556 | ARM64_SYS_REG(3, 0, 0, 2, 3)); | |
557 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar4, | |
558 | ARM64_SYS_REG(3, 0, 0, 2, 4)); | |
559 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar5, | |
560 | ARM64_SYS_REG(3, 0, 0, 2, 5)); | |
561 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar6, | |
562 | ARM64_SYS_REG(3, 0, 0, 2, 7)); | |
563 | ||
564 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr0, | |
565 | ARM64_SYS_REG(3, 0, 0, 3, 0)); | |
566 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr1, | |
567 | ARM64_SYS_REG(3, 0, 0, 3, 1)); | |
568 | err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr2, | |
569 | ARM64_SYS_REG(3, 0, 0, 3, 2)); | |
570 | } | |
571 | ||
26861c7c MH |
572 | kvm_arm_destroy_scratch_host_vcpu(fdarray); |
573 | ||
9d60dea9 RH |
574 | if (err < 0) { |
575 | return false; | |
576 | } | |
577 | ||
26861c7c MH |
578 | /* We can assume any KVM supporting CPU is at least a v8 |
579 | * with VFPv4+Neon; this in turn implies most of the other | |
580 | * feature bits. | |
581 | */ | |
582 | set_feature(&features, ARM_FEATURE_V8); | |
583 | set_feature(&features, ARM_FEATURE_VFP4); | |
584 | set_feature(&features, ARM_FEATURE_NEON); | |
585 | set_feature(&features, ARM_FEATURE_AARCH64); | |
929e754d | 586 | set_feature(&features, ARM_FEATURE_PMU); |
26861c7c | 587 | |
c4487d76 | 588 | ahcf->features = features; |
26861c7c MH |
589 | |
590 | return true; | |
591 | } | |
592 | ||
eb5e1d3c PF |
593 | #define ARM_CPU_ID_MPIDR 3, 0, 0, 0, 5 |
594 | ||
26861c7c MH |
595 | int kvm_arch_init_vcpu(CPUState *cs) |
596 | { | |
26861c7c | 597 | int ret; |
eb5e1d3c | 598 | uint64_t mpidr; |
228d5e04 | 599 | ARMCPU *cpu = ARM_CPU(cs); |
929e754d | 600 | CPUARMState *env = &cpu->env; |
26861c7c MH |
601 | |
602 | if (cpu->kvm_target == QEMU_KVM_ARM_TARGET_NONE || | |
56073970 | 603 | !object_dynamic_cast(OBJECT(cpu), TYPE_AARCH64_CPU)) { |
26861c7c MH |
604 | fprintf(stderr, "KVM is not supported for this guest CPU type\n"); |
605 | return -EINVAL; | |
606 | } | |
607 | ||
228d5e04 PS |
608 | /* Determine init features for this CPU */ |
609 | memset(cpu->kvm_init_features, 0, sizeof(cpu->kvm_init_features)); | |
26861c7c | 610 | if (cpu->start_powered_off) { |
228d5e04 PS |
611 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_POWER_OFF; |
612 | } | |
7cd62e53 | 613 | if (kvm_check_extension(cs->kvm_state, KVM_CAP_ARM_PSCI_0_2)) { |
dd032e34 | 614 | cpu->psci_version = 2; |
7cd62e53 PS |
615 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_PSCI_0_2; |
616 | } | |
56073970 GB |
617 | if (!arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) { |
618 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_EL1_32BIT; | |
619 | } | |
b1659527 | 620 | if (!kvm_check_extension(cs->kvm_state, KVM_CAP_ARM_PMU_V3)) { |
929e754d WH |
621 | cpu->has_pmu = false; |
622 | } | |
623 | if (cpu->has_pmu) { | |
5c0a3819 | 624 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_PMU_V3; |
929e754d WH |
625 | } else { |
626 | unset_feature(&env->features, ARM_FEATURE_PMU); | |
5c0a3819 | 627 | } |
228d5e04 PS |
628 | |
629 | /* Do KVM_ARM_VCPU_INIT ioctl */ | |
630 | ret = kvm_arm_vcpu_init(cs); | |
631 | if (ret) { | |
632 | return ret; | |
26861c7c | 633 | } |
26861c7c | 634 | |
eb5e1d3c PF |
635 | /* |
636 | * When KVM is in use, PSCI is emulated in-kernel and not by qemu. | |
637 | * Currently KVM has its own idea about MPIDR assignment, so we | |
638 | * override our defaults with what we get from KVM. | |
639 | */ | |
640 | ret = kvm_get_one_reg(cs, ARM64_SYS_REG(ARM_CPU_ID_MPIDR), &mpidr); | |
641 | if (ret) { | |
642 | return ret; | |
643 | } | |
0f4a9e45 | 644 | cpu->mp_affinity = mpidr & ARM64_AFFINITY_MASK; |
eb5e1d3c | 645 | |
29eb3d9a AB |
646 | kvm_arm_init_debug(cs); |
647 | ||
202ccb6b DG |
648 | /* Check whether user space can specify guest syndrome value */ |
649 | kvm_arm_init_serror_injection(cs); | |
650 | ||
38df27c8 AB |
651 | return kvm_arm_init_cpreg_list(cpu); |
652 | } | |
26861c7c | 653 | |
38df27c8 AB |
654 | bool kvm_arm_reg_syncs_via_cpreg_list(uint64_t regidx) |
655 | { | |
656 | /* Return true if the regidx is a register we should synchronize | |
657 | * via the cpreg_tuples array (ie is not a core reg we sync by | |
658 | * hand in kvm_arch_get/put_registers()) | |
659 | */ | |
660 | switch (regidx & KVM_REG_ARM_COPROC_MASK) { | |
661 | case KVM_REG_ARM_CORE: | |
662 | return false; | |
663 | default: | |
664 | return true; | |
665 | } | |
26861c7c MH |
666 | } |
667 | ||
4b7a6bf4 CD |
668 | typedef struct CPRegStateLevel { |
669 | uint64_t regidx; | |
670 | int level; | |
671 | } CPRegStateLevel; | |
672 | ||
673 | /* All system registers not listed in the following table are assumed to be | |
674 | * of the level KVM_PUT_RUNTIME_STATE. If a register should be written less | |
675 | * often, you must add it to this table with a state of either | |
676 | * KVM_PUT_RESET_STATE or KVM_PUT_FULL_STATE. | |
677 | */ | |
678 | static const CPRegStateLevel non_runtime_cpregs[] = { | |
679 | { KVM_REG_ARM_TIMER_CNT, KVM_PUT_FULL_STATE }, | |
680 | }; | |
681 | ||
682 | int kvm_arm_cpreg_level(uint64_t regidx) | |
683 | { | |
684 | int i; | |
685 | ||
686 | for (i = 0; i < ARRAY_SIZE(non_runtime_cpregs); i++) { | |
687 | const CPRegStateLevel *l = &non_runtime_cpregs[i]; | |
688 | if (l->regidx == regidx) { | |
689 | return l->level; | |
690 | } | |
691 | } | |
692 | ||
693 | return KVM_PUT_RUNTIME_STATE; | |
694 | } | |
695 | ||
26861c7c MH |
696 | #define AARCH64_CORE_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U64 | \ |
697 | KVM_REG_ARM_CORE | KVM_REG_ARM_CORE_REG(x)) | |
698 | ||
0e4b5869 AB |
699 | #define AARCH64_SIMD_CORE_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U128 | \ |
700 | KVM_REG_ARM_CORE | KVM_REG_ARM_CORE_REG(x)) | |
701 | ||
702 | #define AARCH64_SIMD_CTRL_REG(x) (KVM_REG_ARM64 | KVM_REG_SIZE_U32 | \ | |
703 | KVM_REG_ARM_CORE | KVM_REG_ARM_CORE_REG(x)) | |
704 | ||
26861c7c MH |
705 | int kvm_arch_put_registers(CPUState *cs, int level) |
706 | { | |
707 | struct kvm_one_reg reg; | |
0e4b5869 | 708 | uint32_t fpr; |
26861c7c MH |
709 | uint64_t val; |
710 | int i; | |
711 | int ret; | |
25b9fb10 | 712 | unsigned int el; |
26861c7c MH |
713 | |
714 | ARMCPU *cpu = ARM_CPU(cs); | |
715 | CPUARMState *env = &cpu->env; | |
716 | ||
56073970 GB |
717 | /* If we are in AArch32 mode then we need to copy the AArch32 regs to the |
718 | * AArch64 registers before pushing them out to 64-bit KVM. | |
719 | */ | |
720 | if (!is_a64(env)) { | |
721 | aarch64_sync_32_to_64(env); | |
722 | } | |
723 | ||
26861c7c MH |
724 | for (i = 0; i < 31; i++) { |
725 | reg.id = AARCH64_CORE_REG(regs.regs[i]); | |
726 | reg.addr = (uintptr_t) &env->xregs[i]; | |
727 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
728 | if (ret) { | |
729 | return ret; | |
730 | } | |
731 | } | |
732 | ||
f502cfc2 PM |
733 | /* KVM puts SP_EL0 in regs.sp and SP_EL1 in regs.sp_el1. On the |
734 | * QEMU side we keep the current SP in xregs[31] as well. | |
735 | */ | |
9208b961 | 736 | aarch64_save_sp(env, 1); |
f502cfc2 | 737 | |
26861c7c | 738 | reg.id = AARCH64_CORE_REG(regs.sp); |
f502cfc2 PM |
739 | reg.addr = (uintptr_t) &env->sp_el[0]; |
740 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
741 | if (ret) { | |
742 | return ret; | |
743 | } | |
744 | ||
745 | reg.id = AARCH64_CORE_REG(sp_el1); | |
746 | reg.addr = (uintptr_t) &env->sp_el[1]; | |
26861c7c MH |
747 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); |
748 | if (ret) { | |
749 | return ret; | |
750 | } | |
751 | ||
752 | /* Note that KVM thinks pstate is 64 bit but we use a uint32_t */ | |
56073970 GB |
753 | if (is_a64(env)) { |
754 | val = pstate_read(env); | |
755 | } else { | |
756 | val = cpsr_read(env); | |
757 | } | |
26861c7c MH |
758 | reg.id = AARCH64_CORE_REG(regs.pstate); |
759 | reg.addr = (uintptr_t) &val; | |
760 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
761 | if (ret) { | |
762 | return ret; | |
763 | } | |
764 | ||
765 | reg.id = AARCH64_CORE_REG(regs.pc); | |
766 | reg.addr = (uintptr_t) &env->pc; | |
767 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
768 | if (ret) { | |
769 | return ret; | |
770 | } | |
771 | ||
a0618a19 | 772 | reg.id = AARCH64_CORE_REG(elr_el1); |
6947f059 | 773 | reg.addr = (uintptr_t) &env->elr_el[1]; |
a0618a19 PM |
774 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); |
775 | if (ret) { | |
776 | return ret; | |
777 | } | |
778 | ||
25b9fb10 AB |
779 | /* Saved Program State Registers |
780 | * | |
781 | * Before we restore from the banked_spsr[] array we need to | |
782 | * ensure that any modifications to env->spsr are correctly | |
783 | * reflected in the banks. | |
784 | */ | |
785 | el = arm_current_el(env); | |
786 | if (el > 0 && !is_a64(env)) { | |
787 | i = bank_number(env->uncached_cpsr & CPSR_M); | |
788 | env->banked_spsr[i] = env->spsr; | |
789 | } | |
790 | ||
791 | /* KVM 0-4 map to QEMU banks 1-5 */ | |
a65f1de9 PM |
792 | for (i = 0; i < KVM_NR_SPSR; i++) { |
793 | reg.id = AARCH64_CORE_REG(spsr[i]); | |
25b9fb10 | 794 | reg.addr = (uintptr_t) &env->banked_spsr[i + 1]; |
a65f1de9 PM |
795 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); |
796 | if (ret) { | |
797 | return ret; | |
798 | } | |
799 | } | |
800 | ||
9a2b5256 | 801 | /* Advanced SIMD and FP registers. */ |
0e4b5869 | 802 | for (i = 0; i < 32; i++) { |
9a2b5256 | 803 | uint64_t *q = aa64_vfp_qreg(env, i); |
0e4b5869 | 804 | #ifdef HOST_WORDS_BIGENDIAN |
9a2b5256 RH |
805 | uint64_t fp_val[2] = { q[1], q[0] }; |
806 | reg.addr = (uintptr_t)fp_val; | |
0e4b5869 | 807 | #else |
9a2b5256 | 808 | reg.addr = (uintptr_t)q; |
0e4b5869 AB |
809 | #endif |
810 | reg.id = AARCH64_SIMD_CORE_REG(fp_regs.vregs[i]); | |
0e4b5869 AB |
811 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); |
812 | if (ret) { | |
813 | return ret; | |
814 | } | |
815 | } | |
816 | ||
817 | reg.addr = (uintptr_t)(&fpr); | |
818 | fpr = vfp_get_fpsr(env); | |
819 | reg.id = AARCH64_SIMD_CTRL_REG(fp_regs.fpsr); | |
820 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
821 | if (ret) { | |
822 | return ret; | |
823 | } | |
824 | ||
825 | fpr = vfp_get_fpcr(env); | |
826 | reg.id = AARCH64_SIMD_CTRL_REG(fp_regs.fpcr); | |
827 | ret = kvm_vcpu_ioctl(cs, KVM_SET_ONE_REG, ®); | |
828 | if (ret) { | |
829 | return ret; | |
830 | } | |
831 | ||
202ccb6b DG |
832 | ret = kvm_put_vcpu_events(cpu); |
833 | if (ret) { | |
834 | return ret; | |
835 | } | |
836 | ||
4b7a6bf4 | 837 | if (!write_list_to_kvmstate(cpu, level)) { |
568bab1f PS |
838 | return EINVAL; |
839 | } | |
840 | ||
1a1753f7 AB |
841 | kvm_arm_sync_mpstate_to_kvm(cpu); |
842 | ||
26861c7c MH |
843 | return ret; |
844 | } | |
845 | ||
846 | int kvm_arch_get_registers(CPUState *cs) | |
847 | { | |
848 | struct kvm_one_reg reg; | |
849 | uint64_t val; | |
0e4b5869 | 850 | uint32_t fpr; |
25b9fb10 | 851 | unsigned int el; |
26861c7c MH |
852 | int i; |
853 | int ret; | |
854 | ||
855 | ARMCPU *cpu = ARM_CPU(cs); | |
856 | CPUARMState *env = &cpu->env; | |
857 | ||
858 | for (i = 0; i < 31; i++) { | |
859 | reg.id = AARCH64_CORE_REG(regs.regs[i]); | |
860 | reg.addr = (uintptr_t) &env->xregs[i]; | |
861 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
862 | if (ret) { | |
863 | return ret; | |
864 | } | |
865 | } | |
866 | ||
867 | reg.id = AARCH64_CORE_REG(regs.sp); | |
f502cfc2 PM |
868 | reg.addr = (uintptr_t) &env->sp_el[0]; |
869 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
870 | if (ret) { | |
871 | return ret; | |
872 | } | |
873 | ||
874 | reg.id = AARCH64_CORE_REG(sp_el1); | |
875 | reg.addr = (uintptr_t) &env->sp_el[1]; | |
26861c7c MH |
876 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); |
877 | if (ret) { | |
878 | return ret; | |
879 | } | |
880 | ||
881 | reg.id = AARCH64_CORE_REG(regs.pstate); | |
882 | reg.addr = (uintptr_t) &val; | |
883 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
884 | if (ret) { | |
885 | return ret; | |
886 | } | |
56073970 GB |
887 | |
888 | env->aarch64 = ((val & PSTATE_nRW) == 0); | |
889 | if (is_a64(env)) { | |
890 | pstate_write(env, val); | |
891 | } else { | |
50866ba5 | 892 | cpsr_write(env, val, 0xffffffff, CPSRWriteRaw); |
56073970 | 893 | } |
26861c7c | 894 | |
f502cfc2 PM |
895 | /* KVM puts SP_EL0 in regs.sp and SP_EL1 in regs.sp_el1. On the |
896 | * QEMU side we keep the current SP in xregs[31] as well. | |
897 | */ | |
9208b961 | 898 | aarch64_restore_sp(env, 1); |
f502cfc2 | 899 | |
26861c7c MH |
900 | reg.id = AARCH64_CORE_REG(regs.pc); |
901 | reg.addr = (uintptr_t) &env->pc; | |
902 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
903 | if (ret) { | |
904 | return ret; | |
905 | } | |
906 | ||
56073970 GB |
907 | /* If we are in AArch32 mode then we need to sync the AArch32 regs with the |
908 | * incoming AArch64 regs received from 64-bit KVM. | |
909 | * We must perform this after all of the registers have been acquired from | |
910 | * the kernel. | |
911 | */ | |
912 | if (!is_a64(env)) { | |
913 | aarch64_sync_64_to_32(env); | |
914 | } | |
915 | ||
a0618a19 | 916 | reg.id = AARCH64_CORE_REG(elr_el1); |
6947f059 | 917 | reg.addr = (uintptr_t) &env->elr_el[1]; |
a0618a19 PM |
918 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); |
919 | if (ret) { | |
920 | return ret; | |
921 | } | |
922 | ||
25b9fb10 AB |
923 | /* Fetch the SPSR registers |
924 | * | |
925 | * KVM SPSRs 0-4 map to QEMU banks 1-5 | |
926 | */ | |
a65f1de9 PM |
927 | for (i = 0; i < KVM_NR_SPSR; i++) { |
928 | reg.id = AARCH64_CORE_REG(spsr[i]); | |
25b9fb10 | 929 | reg.addr = (uintptr_t) &env->banked_spsr[i + 1]; |
a65f1de9 PM |
930 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); |
931 | if (ret) { | |
932 | return ret; | |
933 | } | |
934 | } | |
935 | ||
25b9fb10 AB |
936 | el = arm_current_el(env); |
937 | if (el > 0 && !is_a64(env)) { | |
938 | i = bank_number(env->uncached_cpsr & CPSR_M); | |
939 | env->spsr = env->banked_spsr[i]; | |
940 | } | |
941 | ||
9a2b5256 | 942 | /* Advanced SIMD and FP registers */ |
0e4b5869 | 943 | for (i = 0; i < 32; i++) { |
9a2b5256 | 944 | uint64_t *q = aa64_vfp_qreg(env, i); |
0e4b5869 | 945 | reg.id = AARCH64_SIMD_CORE_REG(fp_regs.vregs[i]); |
9a2b5256 | 946 | reg.addr = (uintptr_t)q; |
0e4b5869 AB |
947 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); |
948 | if (ret) { | |
949 | return ret; | |
950 | } else { | |
0e4b5869 | 951 | #ifdef HOST_WORDS_BIGENDIAN |
9a2b5256 RH |
952 | uint64_t t; |
953 | t = q[0], q[0] = q[1], q[1] = t; | |
0e4b5869 AB |
954 | #endif |
955 | } | |
956 | } | |
957 | ||
958 | reg.addr = (uintptr_t)(&fpr); | |
959 | reg.id = AARCH64_SIMD_CTRL_REG(fp_regs.fpsr); | |
960 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
961 | if (ret) { | |
962 | return ret; | |
963 | } | |
964 | vfp_set_fpsr(env, fpr); | |
965 | ||
966 | reg.id = AARCH64_SIMD_CTRL_REG(fp_regs.fpcr); | |
967 | ret = kvm_vcpu_ioctl(cs, KVM_GET_ONE_REG, ®); | |
968 | if (ret) { | |
969 | return ret; | |
970 | } | |
971 | vfp_set_fpcr(env, fpr); | |
972 | ||
202ccb6b DG |
973 | ret = kvm_get_vcpu_events(cpu); |
974 | if (ret) { | |
975 | return ret; | |
976 | } | |
977 | ||
568bab1f PS |
978 | if (!write_kvmstate_to_list(cpu)) { |
979 | return EINVAL; | |
980 | } | |
981 | /* Note that it's OK to have registers which aren't in CPUState, | |
982 | * so we can ignore a failure return here. | |
983 | */ | |
984 | write_list_to_cpustate(cpu); | |
985 | ||
1a1753f7 AB |
986 | kvm_arm_sync_mpstate_to_qemu(cpu); |
987 | ||
26861c7c MH |
988 | /* TODO: other registers */ |
989 | return ret; | |
990 | } | |
2ecb2027 AB |
991 | |
992 | /* C6.6.29 BRK instruction */ | |
993 | static const uint32_t brk_insn = 0xd4200000; | |
994 | ||
995 | int kvm_arch_insert_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp) | |
996 | { | |
997 | if (have_guest_debug) { | |
998 | if (cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn, 4, 0) || | |
999 | cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&brk_insn, 4, 1)) { | |
1000 | return -EINVAL; | |
1001 | } | |
1002 | return 0; | |
1003 | } else { | |
1004 | error_report("guest debug not supported on this kernel"); | |
1005 | return -EINVAL; | |
1006 | } | |
1007 | } | |
1008 | ||
1009 | int kvm_arch_remove_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp) | |
1010 | { | |
1011 | static uint32_t brk; | |
1012 | ||
1013 | if (have_guest_debug) { | |
1014 | if (cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&brk, 4, 0) || | |
1015 | brk != brk_insn || | |
1016 | cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn, 4, 1)) { | |
1017 | return -EINVAL; | |
1018 | } | |
1019 | return 0; | |
1020 | } else { | |
1021 | error_report("guest debug not supported on this kernel"); | |
1022 | return -EINVAL; | |
1023 | } | |
1024 | } | |
1025 | ||
1026 | /* See v8 ARM ARM D7.2.27 ESR_ELx, Exception Syndrome Register | |
1027 | * | |
1028 | * To minimise translating between kernel and user-space the kernel | |
1029 | * ABI just provides user-space with the full exception syndrome | |
1030 | * register value to be decoded in QEMU. | |
1031 | */ | |
1032 | ||
1033 | bool kvm_arm_handle_debug(CPUState *cs, struct kvm_debug_exit_arch *debug_exit) | |
1034 | { | |
64b91e3f | 1035 | int hsr_ec = syn_get_ec(debug_exit->hsr); |
2ecb2027 | 1036 | ARMCPU *cpu = ARM_CPU(cs); |
34c45d53 | 1037 | CPUClass *cc = CPU_GET_CLASS(cs); |
2ecb2027 AB |
1038 | CPUARMState *env = &cpu->env; |
1039 | ||
1040 | /* Ensure PC is synchronised */ | |
1041 | kvm_cpu_synchronize_state(cs); | |
1042 | ||
1043 | switch (hsr_ec) { | |
26ae5934 AB |
1044 | case EC_SOFTWARESTEP: |
1045 | if (cs->singlestep_enabled) { | |
1046 | return true; | |
1047 | } else { | |
34c45d53 AB |
1048 | /* |
1049 | * The kernel should have suppressed the guest's ability to | |
1050 | * single step at this point so something has gone wrong. | |
1051 | */ | |
1052 | error_report("%s: guest single-step while debugging unsupported" | |
dffc5851 | 1053 | " (%"PRIx64", %"PRIx32")", |
34c45d53 AB |
1054 | __func__, env->pc, debug_exit->hsr); |
1055 | return false; | |
26ae5934 AB |
1056 | } |
1057 | break; | |
2ecb2027 AB |
1058 | case EC_AA64_BKPT: |
1059 | if (kvm_find_sw_breakpoint(cs, env->pc)) { | |
1060 | return true; | |
1061 | } | |
1062 | break; | |
e4482ab7 AB |
1063 | case EC_BREAKPOINT: |
1064 | if (find_hw_breakpoint(cs, env->pc)) { | |
1065 | return true; | |
1066 | } | |
1067 | break; | |
1068 | case EC_WATCHPOINT: | |
1069 | { | |
1070 | CPUWatchpoint *wp = find_hw_watchpoint(cs, debug_exit->far); | |
1071 | if (wp) { | |
1072 | cs->watchpoint_hit = wp; | |
1073 | return true; | |
1074 | } | |
1075 | break; | |
1076 | } | |
2ecb2027 | 1077 | default: |
dffc5851 | 1078 | error_report("%s: unhandled debug exit (%"PRIx32", %"PRIx64")", |
2ecb2027 AB |
1079 | __func__, debug_exit->hsr, env->pc); |
1080 | } | |
1081 | ||
34c45d53 AB |
1082 | /* If we are not handling the debug exception it must belong to |
1083 | * the guest. Let's re-use the existing TCG interrupt code to set | |
1084 | * everything up properly. | |
1085 | */ | |
1086 | cs->exception_index = EXCP_BKPT; | |
1087 | env->exception.syndrome = debug_exit->hsr; | |
1088 | env->exception.vaddress = debug_exit->far; | |
14f9a5c0 | 1089 | env->exception.target_el = 1; |
9b16ec43 | 1090 | qemu_mutex_lock_iothread(); |
34c45d53 | 1091 | cc->do_interrupt(cs); |
9b16ec43 | 1092 | qemu_mutex_unlock_iothread(); |
2ecb2027 AB |
1093 | |
1094 | return false; | |
1095 | } |