Received: by 2002:ab2:7a55:0:b0:1f4:4a7d:290d with SMTP id u21csp600036lqp; Fri, 5 Apr 2024 03:26:32 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXKSm1R8eCt5y0+fMYBgYSP/1f/+u/YW0d0PPKdr4KkO75/CYyOMYYOa/CHWksfctpaMJeewjrdWuJdOVQPHFLxRNuDT1Iy36x/RhTzew== X-Google-Smtp-Source: AGHT+IG3pxTxsQmYS44NSVeRWagH+TD4H+iPkQ7CtAtBD3Xict349Xwuhq0CEnGnUI9gy4xvgc1w X-Received: by 2002:a50:a6da:0:b0:56e:2e94:2964 with SMTP id f26-20020a50a6da000000b0056e2e942964mr704270edc.15.1712312791717; Fri, 05 Apr 2024 03:26:31 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712312791; cv=pass; d=google.com; s=arc-20160816; b=ulI98HMNP6R2buVGIRVm21wUKubnaOAHN5kE/ZYa8lqGDjioVoy+ZfS7MgcnuxBa0Z zqvRXdQHC1CmNLd71ZFSJsPyfqdbUms1H3hH2jThjY3J2yPAH+kKXAAGVtG3igrYIuL5 zwBoqr9GpHk18GXl8oI3b9an63oh/90psCnVEbqp0mie3RSsEnyo540VDgafHiaWPfsJ H+IkAKoFeHOXv3LiJr/wkabUtq5FHnJsbgNKytmKjyFPWYBeDpUzPUfZWikPRPYpnVSa m4pXrmTYrFmXUkUC1EEvLvCJ2bfM1eyouYXLAVj6ufreLYsFemqR8lY3f4Wi5CwfWS0l Bzuw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:references:in-reply-to:subject:cc:to:from:message-id :date:dkim-signature; bh=saz5S5oVUoa6xyawspQzdd0ExVZsD2OtLocgkmouzek=; fh=CaMLefaqfqQxHzm59/7LZjjLYrzBmD/KSjzsclhOIw4=; b=T0CIJbU4HUYu9UuzeS8FitQSH0sePeUU50YDWszijoXiqRpZvXWO5WEjCKq3pufQuG W+ynCdHRw1Ud0fpJDPytrEQKyO7oUJZkMp0EfqrNAM/h91XD55BjVJgFUry7eDPXOToy 39lHsg0ykvihWyURVfovQKdOGn1Lfr/m927lJ8R1n4CRFirkp2WtcRACV6Yz+GoIYkxb BHw6mWQcrRtN9gIWOk44bW6ieHL9hXsq4sOGTvWyZqrW4Eby/XftBiJ/v+MaCWD/wxR5 ioq6Ifsbxb6OPcM5l3hibxK34QI5o+TQAEW4Tk1/e70TBcR3OdRmbGf+00lYPCwvgAao xzWg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CRX7H4UB; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-132821-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-132821-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id s24-20020a508d18000000b0056e31acf883si391825eds.512.2024.04.05.03.26.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 05 Apr 2024 03:26:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-132821-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CRX7H4UB; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-132821-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-132821-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 479321F228AE for ; Fri, 5 Apr 2024 10:26:31 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 714B616ABCD; Fri, 5 Apr 2024 10:26:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CRX7H4UB" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 48F9316ABD7; Fri, 5 Apr 2024 10:26:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712312772; cv=none; b=ZFEw88wX2Hp5xxHLAyxE3UwN3jfiVvEUAYJTq4N0K0bOXqHCCRiFGrA0/oTKPyfukhLvNOoT5gpkqOTZfG3mYJsP2m4lu5xMdJS1WIpUmAXUhjTGVcXIjbIWm61R2dFzNLftCuJTvU9GN3Clah1I5KdUXhYL6SpJZHkkcrTt8ZE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712312772; c=relaxed/simple; bh=HtLpKedjx0y5wps8iP5hKkJRmK1rcWNkMEh1B6of13Q=; h=Date:Message-ID:From:To:Cc:Subject:In-Reply-To:References: MIME-Version:Content-Type; b=LtYL4Kqg7+AAcqDNW8xILVdSjrM8SjtNmzJebyU3XcXdfoHw0cjwGbAj8wpdR+a0JtfHWuP1kWB4B0QqzhCZcvslcubH7+VI/ikBsmpWN+FsPXxf36tJFwuZVdgCEaVV4mL0Trqy0l5Ir0FmWmSYqqpt0iGphbJaETxZ+j2Smg4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=CRX7H4UB; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 856A4C433F1; Fri, 5 Apr 2024 10:26:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1712312771; bh=HtLpKedjx0y5wps8iP5hKkJRmK1rcWNkMEh1B6of13Q=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=CRX7H4UBB7kPSUzXnxDKmSNo532TD3YO4D+qrDYw2dW6eOBQYREN4zbANv47di5wi EDPQM3+HT5pSSvPIh+/KPGDacf5922NfQwxGqvZDFzwnvIzJwna1folgAYE3H+xJuv /AvFKW1QTLTyU01rXyClNL2GN6CvCQK1HMnIXcweLI5WI75lrxY4oq19XeJ/q6LuUl ZWnNBp+ailhaRMRsmupdhJN9ID2KpIkT5vmdWeV8qBTPrvQZpFJ5H0cxHbohYLVniO 9YZsqDHaHjO7n8U75wZI+k+GLAQkzSjC11rW0MN7KgGAE5D3166HBBT86txAItg8ql kRouyou8kMxZA== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1rsglt-001mIH-64; Fri, 05 Apr 2024 11:26:09 +0100 Date: Fri, 05 Apr 2024 11:26:08 +0100 Message-ID: <868r1st8an.wl-maz@kernel.org> From: Marc Zyngier To: Anshuman Khandual Cc: linux-arm-kernel@lists.infradead.org, Jonathan Corbet , Oliver Upton , James Morse , Suzuki K Poulose , Catalin Marinas , Will Deacon , Mark Brown , Mark Rutland , kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [RFC 8/8] arm64/hw_breakpoint: Enable FEAT_Debugv8p9 In-Reply-To: <20240405080008.1225223-9-anshuman.khandual@arm.com> References: <20240405080008.1225223-1-anshuman.khandual@arm.com> <20240405080008.1225223-9-anshuman.khandual@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/29.2 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: anshuman.khandual@arm.com, linux-arm-kernel@lists.infradead.org, corbet@lwn.net, oliver.upton@linux.dev, james.morse@arm.com, suzuki.poulose@arm.com, catalin.marinas@arm.com, will@kernel.org, broonie@kernel.org, mark.rutland@arm.com, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false On Fri, 05 Apr 2024 09:00:08 +0100, Anshuman Khandual wrote: > > Currently there can be maximum 16 breakpoints, and 16 watchpoints available > on a given platform - as detected from ID_AA64DFR0_EL1.[BRPs|WRPs] register > fields. But these breakpoint, and watchpoints can be extended further up to > 64 via a new arch feature FEAT_Debugv8p9. > > This first enables banked access for the breakpoint and watchpoint register > set via MDSELR_EL1, extended exceptions via MDSCR_EL1.EMBWE and determining > available breakpoints and watchpoints in the platform from ID_AA64DFR1_EL1, > when FEAT_Debugv8p9 is enabled. > > Cc: Catalin Marinas > Cc: Will Deacon > Cc: Mark Rutland > Cc: linux-arm-kernel@lists.infradead.org > Cc: linux-kernel@vger.kernel.org > Signed-off-by: Anshuman Khandual > --- > arch/arm64/include/asm/debug-monitors.h | 2 +- > arch/arm64/include/asm/hw_breakpoint.h | 46 +++++++++++++++++++------ > arch/arm64/kernel/debug-monitors.c | 16 ++++++--- > arch/arm64/kernel/hw_breakpoint.c | 33 ++++++++++++++++++ > 4 files changed, 82 insertions(+), 15 deletions(-) > > diff --git a/arch/arm64/include/asm/debug-monitors.h b/arch/arm64/include/asm/debug-monitors.h > index 13d437bcbf58..75eedba2abbe 100644 > --- a/arch/arm64/include/asm/debug-monitors.h > +++ b/arch/arm64/include/asm/debug-monitors.h > @@ -19,7 +19,7 @@ > /* MDSCR_EL1 enabling bits */ > #define DBG_MDSCR_KDE (1 << 13) > #define DBG_MDSCR_MDE (1 << 15) > -#define DBG_MDSCR_MASK ~(DBG_MDSCR_KDE | DBG_MDSCR_MDE) > +#define DBG_MDSCR_EMBWE (1UL << 32) > > #define DBG_ESR_EVT(x) (((x) >> 27) & 0x7) > > diff --git a/arch/arm64/include/asm/hw_breakpoint.h b/arch/arm64/include/asm/hw_breakpoint.h > index bd81cf17744a..6b9822140f71 100644 > --- a/arch/arm64/include/asm/hw_breakpoint.h > +++ b/arch/arm64/include/asm/hw_breakpoint.h > @@ -79,8 +79,8 @@ static inline void decode_ctrl_reg(u32 reg, > * Limits. > * Changing these will require modifications to the register accessors. > */ > -#define ARM_MAX_BRP 16 > -#define ARM_MAX_WRP 16 > +#define ARM_MAX_BRP 64 > +#define ARM_MAX_WRP 64 > > /* Virtual debug register bases. */ > #define AARCH64_DBG_REG_BVR 0 > @@ -135,22 +135,48 @@ static inline void ptrace_hw_copy_thread(struct task_struct *task) > } > #endif > > +static inline bool is_debug_v8p9_enabled(void) > +{ > + u64 dfr0 = read_sanitised_ftr_reg(SYS_ID_AA64DFR0_EL1); > + int dver = cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_DebugVer_SHIFT); > + > + return dver == ID_AA64DFR0_EL1_DebugVer_V8P9; > +} > + > /* Determine number of BRP registers available. */ > static inline int get_num_brps(void) > { > - u64 dfr0 = read_sanitised_ftr_reg(SYS_ID_AA64DFR0_EL1); > - return 1 + > - cpuid_feature_extract_unsigned_field(dfr0, > - ID_AA64DFR0_EL1_BRPs_SHIFT); > + u64 dfr0, dfr1; > + int dver, brps; > + > + dfr0 = read_sanitised_ftr_reg(SYS_ID_AA64DFR0_EL1); > + dver = cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_DebugVer_SHIFT); > + if (dver == ID_AA64DFR0_EL1_DebugVer_V8P9) { > + dfr1 = read_sanitised_ftr_reg(SYS_ID_AA64DFR1_EL1); > + brps = cpuid_feature_extract_unsigned_field_width(dfr1, > + ID_AA64DFR1_EL1_BRPs_SHIFT, 8); > + } else { > + brps = cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRPs_SHIFT); > + } > + return 1 + brps; > } > > /* Determine number of WRP registers available. */ > static inline int get_num_wrps(void) > { > - u64 dfr0 = read_sanitised_ftr_reg(SYS_ID_AA64DFR0_EL1); > - return 1 + > - cpuid_feature_extract_unsigned_field(dfr0, > - ID_AA64DFR0_EL1_WRPs_SHIFT); > + u64 dfr0, dfr1; > + int dver, wrps; > + > + dfr0 = read_sanitised_ftr_reg(SYS_ID_AA64DFR0_EL1); > + dver = cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_DebugVer_SHIFT); > + if (dver == ID_AA64DFR0_EL1_DebugVer_V8P9) { > + dfr1 = read_sanitised_ftr_reg(SYS_ID_AA64DFR1_EL1); > + wrps = cpuid_feature_extract_unsigned_field_width(dfr1, > + ID_AA64DFR1_EL1_WRPs_SHIFT, 8); > + } else { > + wrps = cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_WRPs_SHIFT); > + } > + return 1 + wrps; > } > > #ifdef CONFIG_CPU_PM > diff --git a/arch/arm64/kernel/debug-monitors.c b/arch/arm64/kernel/debug-monitors.c > index 64f2ecbdfe5c..3299d1e8dc61 100644 > --- a/arch/arm64/kernel/debug-monitors.c > +++ b/arch/arm64/kernel/debug-monitors.c > @@ -23,6 +23,7 @@ > #include > #include > #include > +#include include order. > > /* Determine debug architecture. */ > u8 debug_monitors_arch(void) > @@ -34,7 +35,7 @@ u8 debug_monitors_arch(void) > /* > * MDSCR access routines. > */ > -static void mdscr_write(u32 mdscr) > +static void mdscr_write(u64 mdscr) > { > unsigned long flags; > flags = local_daif_save(); > @@ -43,7 +44,7 @@ static void mdscr_write(u32 mdscr) > } > NOKPROBE_SYMBOL(mdscr_write); > > -static u32 mdscr_read(void) > +static u64 mdscr_read(void) > { > return read_sysreg(mdscr_el1); > } > @@ -76,10 +77,11 @@ early_param("nodebugmon", early_debug_disable); > */ > static DEFINE_PER_CPU(int, mde_ref_count); > static DEFINE_PER_CPU(int, kde_ref_count); > +static DEFINE_PER_CPU(int, embwe_ref_count); > > void enable_debug_monitors(enum dbg_active_el el) > { > - u32 mdscr, enable = 0; > + u64 mdscr, enable = 0; > > WARN_ON(preemptible()); > > @@ -90,6 +92,9 @@ void enable_debug_monitors(enum dbg_active_el el) > this_cpu_inc_return(kde_ref_count) == 1) > enable |= DBG_MDSCR_KDE; > > + if (is_debug_v8p9_enabled() && this_cpu_inc_return(embwe_ref_count) == 1) > + enable |= DBG_MDSCR_EMBWE; > + > if (enable && debug_enabled) { > mdscr = mdscr_read(); > mdscr |= enable; > @@ -100,7 +105,7 @@ NOKPROBE_SYMBOL(enable_debug_monitors); > > void disable_debug_monitors(enum dbg_active_el el) > { > - u32 mdscr, disable = 0; > + u64 mdscr, disable = 0; > > WARN_ON(preemptible()); > > @@ -111,6 +116,9 @@ void disable_debug_monitors(enum dbg_active_el el) > this_cpu_dec_return(kde_ref_count) == 0) > disable &= ~DBG_MDSCR_KDE; > > + if (is_debug_v8p9_enabled() && this_cpu_dec_return(embwe_ref_count) == 0) > + disable &= ~DBG_MDSCR_EMBWE; > + > if (disable) { > mdscr = mdscr_read(); > mdscr &= disable; > diff --git a/arch/arm64/kernel/hw_breakpoint.c b/arch/arm64/kernel/hw_breakpoint.c > index 2f5755192c2b..7b9169535b76 100644 > --- a/arch/arm64/kernel/hw_breakpoint.c > +++ b/arch/arm64/kernel/hw_breakpoint.c > @@ -103,10 +103,40 @@ int hw_breakpoint_slots(int type) > WRITE_WB_REG_CASE(OFF, 14, REG, VAL); \ > WRITE_WB_REG_CASE(OFF, 15, REG, VAL) > > +static int set_bank_index(int n) > +{ > + int mdsel_bank; > + int bank = n / 16, index = n % 16; > + > + switch (bank) { > + case 0: > + mdsel_bank = MDSELR_EL1_BANK_BANK_0; > + break; > + case 1: > + mdsel_bank = MDSELR_EL1_BANK_BANK_1; > + break; > + case 2: > + mdsel_bank = MDSELR_EL1_BANK_BANK_2; > + break; > + case 3: > + mdsel_bank = MDSELR_EL1_BANK_BANK_3; > + break; > + default: > + pr_warn("Unknown register bank %d\n", bank); > + return -EINVAL; > + } > + write_sysreg_s(mdsel_bank << MDSELR_EL1_BANK_SHIFT, SYS_MDSELR_EL1); > + isb(); > + return index; > +} > + > static u64 read_wb_reg(int reg, int n) > { > u64 val = 0; > > + if (is_debug_v8p9_enabled()) > + n = set_bank_index(n); > + > switch (reg + n) { > GEN_READ_WB_REG_CASES(AARCH64_DBG_REG_BVR, AARCH64_DBG_REG_NAME_BVR, val); > GEN_READ_WB_REG_CASES(AARCH64_DBG_REG_BCR, AARCH64_DBG_REG_NAME_BCR, val); > @@ -122,6 +152,9 @@ NOKPROBE_SYMBOL(read_wb_reg); > > static void write_wb_reg(int reg, int n, u64 val) > { > + if (is_debug_v8p9_enabled()) > + n = set_bank_index(n); > + > switch (reg + n) { > GEN_WRITE_WB_REG_CASES(AARCH64_DBG_REG_BVR, AARCH64_DBG_REG_NAME_BVR, val); > GEN_WRITE_WB_REG_CASES(AARCH64_DBG_REG_BCR, AARCH64_DBG_REG_NAME_BCR, val); Are these things guaranteed to be only used in contexts where there can be no interleaving of such operations? If any interleaving can occur, this is broken. M. -- Without deviation from the norm, progress is not possible.