Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp4377307pxf; Tue, 16 Mar 2021 11:54:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzl5plepaa/oBAjVZFS1hYgD3rVG7RgxK0c0xIi4Jen+F60kabsPJs+wgleLenuln2qG4yg X-Received: by 2002:a17:907:2bf6:: with SMTP id gv54mr31794885ejc.514.1615920889037; Tue, 16 Mar 2021 11:54:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615920889; cv=none; d=google.com; s=arc-20160816; b=yl6k9xTRsaB+gDOEM7ZzImhZqxYsn0LmGnCN1EG5JEX3vwyuEPyearAr5+4DMkaGbm IAXcE7uGZcepuTbdWEXDRoxQgXdH7fa1g2TDk1/DmiazSypTQp57xunvDj3ZOyVIYorK jx6MfeBDC2dJSjeTs+0XIZm6KGVLpUDPE+ERlVIBW/nGDr66bQxzepcfP3YsTM+rEC4V K2m5Iys8NVh7yzmavxEBbpxrVoOYZLLjgBbPx0Uift9u8IHfb5Nx2PSnYnM/OZJf5VlT +2JTGt2EECc+kyouJzlJWDM34Wwatf46+rsiLDNcBKszHJQsaoE+mY1InkyO3FHDyns7 oGnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=jrJB7tDwxmTQ5+DeVfCaNyjWU7AQJjJKMGYRxu/hMa4=; b=dcFlPVi0XJ686/8ROaf7Dlast/sIQaOcCppGBzFN0OdO5l13sL6liVJtHVgrtXVrJI EmiQ5IbvMT7Nu1s/LoJ3GhHoiAmLTHX00RI5+3st/SrdfOiq+YD9DIJ+t30xhZIfc9lq 86FItW5PKiSPzTCnQhb6YEn4vdtV7vSwiu9H/gB/WlZNPJNmJrw9VjruzlmLlKzwd6Tr vtMgloJGa7wo0HaoBDdv7qt2eoQY7QD7hQ47wgDAlRV+r44E0rBJiSAjTNtilTzK6Kjg Ws/+V4DhOBOtGp8z6/msPXY+Xr+pRPqtTwfGUbxcPX1MiweE6QNzOpCskmDEXqAetU+C 76gA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=AZkdMgaU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jp24si14677880ejb.512.2021.03.16.11.54.26; Tue, 16 Mar 2021 11:54:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=AZkdMgaU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231946AbhCPMfC (ORCPT + 99 others); Tue, 16 Mar 2021 08:35:02 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:52739 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231940AbhCPMeZ (ORCPT ); Tue, 16 Mar 2021 08:34:25 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1615898063; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jrJB7tDwxmTQ5+DeVfCaNyjWU7AQJjJKMGYRxu/hMa4=; b=AZkdMgaUFMzl1Qqf4YBqR7rhCoL8CldEyksIyUAQnZ/iZ9lWqEZgUJgEAYjg8Q9qCMZQYy G6asMjXlHqbCOjzDc8KASoP2yFqzm/bq9bh4IHqnBP79nAlSzj58AFOO0+DDl/GcRrEZQf 4TJ1VzleMRwJFml8G88vEiIGuqvbeT4= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-514-4iXNEeWlMQaj8j-tRRW1Tg-1; Tue, 16 Mar 2021 08:34:21 -0400 X-MC-Unique: 4iXNEeWlMQaj8j-tRRW1Tg-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id D87DD18D6A39; Tue, 16 Mar 2021 12:34:11 +0000 (UTC) Received: from starship (unknown [10.35.207.30]) by smtp.corp.redhat.com (Postfix) with ESMTP id 09BBD1084292; Tue, 16 Mar 2021 12:34:06 +0000 (UTC) Message-ID: <71ae8b75c30fd0f87e760216ad310ddf72d31c7b.camel@redhat.com> Subject: Re: [PATCH 2/3] KVM: x86: guest debug: don't inject interrupts while single stepping From: Maxim Levitsky To: Jan Kiszka , Sean Christopherson Cc: kvm@vger.kernel.org, Vitaly Kuznetsov , linux-kernel@vger.kernel.org, Thomas Gleixner , Wanpeng Li , Kieran Bingham , Jessica Yu , Andrew Morton , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , Joerg Roedel , Jim Mattson , Borislav Petkov , Stefano Garzarella , "H. Peter Anvin" , Paolo Bonzini , Ingo Molnar Date: Tue, 16 Mar 2021 14:34:05 +0200 In-Reply-To: References: <20210315221020.661693-1-mlevitsk@redhat.com> <20210315221020.661693-3-mlevitsk@redhat.com> <1259724f-1bdb-6229-2772-3192f6d17a4a@siemens.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2021-03-16 at 12:27 +0100, Jan Kiszka wrote: > On 16.03.21 11:59, Maxim Levitsky wrote: > > On Tue, 2021-03-16 at 10:16 +0100, Jan Kiszka wrote: > > > On 16.03.21 00:37, Sean Christopherson wrote: > > > > On Tue, Mar 16, 2021, Maxim Levitsky wrote: > > > > > This change greatly helps with two issues: > > > > > > > > > > * Resuming from a breakpoint is much more reliable. > > > > > > > > > > When resuming execution from a breakpoint, with interrupts enabled, more often > > > > > than not, KVM would inject an interrupt and make the CPU jump immediately to > > > > > the interrupt handler and eventually return to the breakpoint, to trigger it > > > > > again. > > > > > > > > > > From the user point of view it looks like the CPU never executed a > > > > > single instruction and in some cases that can even prevent forward progress, > > > > > for example, when the breakpoint is placed by an automated script > > > > > (e.g lx-symbols), which does something in response to the breakpoint and then > > > > > continues the guest automatically. > > > > > If the script execution takes enough time for another interrupt to arrive, > > > > > the guest will be stuck on the same breakpoint RIP forever. > > > > > > > > > > * Normal single stepping is much more predictable, since it won't land the > > > > > debugger into an interrupt handler, so it is much more usable. > > > > > > > > > > (If entry to an interrupt handler is desired, the user can still place a > > > > > breakpoint at it and resume the guest, which won't activate this workaround > > > > > and let the gdb still stop at the interrupt handler) > > > > > > > > > > Since this change is only active when guest is debugged, it won't affect > > > > > KVM running normal 'production' VMs. > > > > > > > > > > > > > > > Signed-off-by: Maxim Levitsky > > > > > Tested-by: Stefano Garzarella > > > > > --- > > > > > arch/x86/kvm/x86.c | 6 ++++++ > > > > > 1 file changed, 6 insertions(+) > > > > > > > > > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > > > > > index a9d95f90a0487..b75d990fcf12b 100644 > > > > > --- a/arch/x86/kvm/x86.c > > > > > +++ b/arch/x86/kvm/x86.c > > > > > @@ -8458,6 +8458,12 @@ static void inject_pending_event(struct kvm_vcpu *vcpu, bool *req_immediate_exit > > > > > can_inject = false; > > > > > } > > > > > > > > > > + /* > > > > > + * Don't inject interrupts while single stepping to make guest debug easier > > > > > + */ > > > > > + if (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP) > > > > > + return; > > > > > > > > Is this something userspace can deal with? E.g. disable IRQs and/or set NMI > > > > blocking at the start of single-stepping, unwind at the end? Deviating this far > > > > from architectural behavior will end in tears at some point. > > > > > > > > > > Does this happen to address this suspicious workaround in the kernel? > > > > > > /* > > > * The kernel doesn't use TF single-step outside of: > > > * > > > * - Kprobes, consumed through kprobe_debug_handler() > > > * - KGDB, consumed through notify_debug() > > > * > > > * So if we get here with DR_STEP set, something is wonky. > > > * > > > * A known way to trigger this is through QEMU's GDB stub, > > > * which leaks #DB into the guest and causes IST recursion. > > > */ > > > if (WARN_ON_ONCE(dr6 & DR_STEP)) > > > regs->flags &= ~X86_EFLAGS_TF; > > > > > > (arch/x86/kernel/traps.c, exc_debug_kernel) > > > > > > I wonder why this got merged while no one fixed QEMU/KVM, for years? Oh, > > > yeah, question to myself as well, dancing around broken guest debugging > > > for a long time while trying to fix other issues... > > > > To be honest I didn't see that warning even once, but I can imagine KVM > > leaking #DB due to bugs in that code. That area historically didn't receive > > much attention since it can only be triggered by > > KVM_GET/SET_GUEST_DEBUG which isn't used in production. > > I've triggered it recently while debugging a guest, that's why I got > aware of the code path. Long ago, all this used to work (soft BPs, > single-stepping etc.) > > > The only issue that I on the other hand did > > see which is mostly gdb fault is that it fails to remove a software breakpoint > > when resuming over it, if that breakpoint's python handler messes up > > with gdb's symbols, which is what lx-symbols does. > > > > And that despite the fact that lx-symbol doesn't mess with the object > > (that is the kernel) where the breakpoint is defined. > > > > Just adding/removing one symbol file is enough to trigger this issue. > > > > Since lx-symbols already works this around when it reloads all symbols, > > I extended that workaround to happen also when loading/unloading > > only a single symbol file. > > You have no issue with interactive debugging when NOT using gdb scripts > / lx-symbol? To be honest I don't use guest debugging that much, so I probably missed some issues. Now that I fixed lx-symbols though I'll probably use guest debugging much more. I will keep an eye on any issues that I find. The main push to fix lx-symbols actually came from me wanting to understand if there is something broken with KVM's guest debugging knowing that lx-symbols crashes the guest when module is loaded after lx-symbols was executed. That lx-symbols related guest crash I traced to issue with gdb as I explained, and the lack of blocking of the interrupts on single step is not a bug but more a missing feature that should be implemented to make single step easier to use. Another issue which isn't a bug is that you can't place a software breakpoint if kernel is not loaded (since there is no code in memory) or if the kernel haven't done basic paging initialization (since there is no paging yet to know where to place the breakpoint). Hardware breakpoints work for this fine though. So in summary I haven't found any major issues with KVM's guest debug yet. If I do notice issues with guest debug, I will try to isolate and debug them. For the issue that you mentioned, do you have a way to reproduce it? Best regards, Maxim Levitsky > > Jan >