From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C4EE6C3DA7A for ; Mon, 2 Jan 2023 17:10:26 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3EF518E0002; Mon, 2 Jan 2023 12:10:26 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 39F1F8E0001; Mon, 2 Jan 2023 12:10:26 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 266F38E0002; Mon, 2 Jan 2023 12:10:26 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 14D5B8E0001 for ; Mon, 2 Jan 2023 12:10:26 -0500 (EST) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id DC79E1C6124 for ; Mon, 2 Jan 2023 17:10:25 +0000 (UTC) X-FDA: 80310497610.19.8B68484 Received: from mail-pj1-f50.google.com (mail-pj1-f50.google.com [209.85.216.50]) by imf21.hostedemail.com (Postfix) with ESMTP id 538291C0018 for ; Mon, 2 Jan 2023 17:10:23 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=kyZ4xodF; spf=pass (imf21.hostedemail.com: domain of dmitrii.bundin.a@gmail.com designates 209.85.216.50 as permitted sender) smtp.mailfrom=dmitrii.bundin.a@gmail.com; dmarc=pass (policy=none) header.from=gmail.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1672679423; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:dkim-signature; bh=AG9MFRwWTVI/Kl6MqXBEN9OhR14xPiVfl8lUSO85VuY=; b=fQEtu5ONf3aOGtx87HiDjzAfSd7jQMOXUp1/QXvJ43dfiTZQD6pAtUvykBVm5swS4CqgEg fYESHL0NQhCJZ9naSAx/PoTCduiFNugcEGKIuXq188n9du0Vztq3anpVoPfFPZ+YZomwH7 dbRaYxdOSNOQCEdAx84VSYsAmqAudWU= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=kyZ4xodF; spf=pass (imf21.hostedemail.com: domain of dmitrii.bundin.a@gmail.com designates 209.85.216.50 as permitted sender) smtp.mailfrom=dmitrii.bundin.a@gmail.com; dmarc=pass (policy=none) header.from=gmail.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1672679423; a=rsa-sha256; cv=none; b=vpMDy6pBY+fNYYgCRlo2g7wrU0CWuESbxHDsqXEXnM8eh4bYCHEJlSIcyIs0XqRvHupVtQ /cCb21cEdp9RnplzbLALKrgB8zqT/whketR4K3lr2VldDqbZvCLd4JdeinBJZYfBhxLntV LXnSgS0JpGz56XCVJ9n+rxpGiAgdHtQ= Received: by mail-pj1-f50.google.com with SMTP id 60-20020a17090a0fc200b002264ebad204so7057468pjz.1 for ; Mon, 02 Jan 2023 09:10:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=references:in-reply-to:message-id:date:subject:cc:to:from:from:to :cc:subject:date:message-id:reply-to; bh=AG9MFRwWTVI/Kl6MqXBEN9OhR14xPiVfl8lUSO85VuY=; b=kyZ4xodFL560aAs0iPo3isZmxLzV/YGrIlrpLOZSJYpYAmk5CDdybGRpvZMhnQsul3 Ibq9QPLHarbgJsdJTHBqzqX4ag8Dolm6INOUvSm6/59vNrepQO1MH3yUiUauKQGh1g0x 8us8EtjNRfUIDL/BG6JqVYc0AoLnTt+2m/FPY4EwOzHHIVJa0wic/WyeOmxJkUVCqCeU YkrOZ7PzfLSHwFrnJITab4Hf9PBCErTqMqZd9NBX4AqG3b6pYMYrnM/vCfWJjUwRgGYG ZsOt5viPna0XXJBNWug7MwVF7hOtg6ch9/EGTvJ08JRdcdZF4xExZqyFrl7AbEQXi/lY sWuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=references:in-reply-to:message-id:date:subject:cc:to:from :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=AG9MFRwWTVI/Kl6MqXBEN9OhR14xPiVfl8lUSO85VuY=; b=FFiWMXbYFzHIVX6OskGZj2faBPTsrWDiC/Hz8EwtgzIcNx5hYKKSmpvgE4i+EX/zgf 9jiTIgYe0/XhiUErksDvRzPPJHEFxblluaz8x54YZ17jKiJX8M3FCnN6w6zLafz+eWTv CgWA3KzGtor30rTZ6wlj/IrvJTz6uSHS3DGRJfk53FvZ4SPiHSQNzE2WdiZpepCuQTHw mdp8OFBVKr3l1NOLhrrCyOtm777FvRXBDiqKCPXvdavf1X1bUPPAWBg/kAdeYbEEETan O+jXZJX+XXC/eDN9wrf19ew+jB32tzqmhtqTuILKNnqgjAAjUL1G75xNzjinXF4b0LrZ 4DVg== X-Gm-Message-State: AFqh2kptGvukcE5KNCk3J6cPxA+MweBLY06aoAgVyl0f+Dm8WmXyeGeM Q0wQ+fY4Pvnz7JOLlUSBLyU= X-Google-Smtp-Source: AMrXdXsTEJukwNAirzni/rzd1GHgnEIMdHnPwHdeskorhgKMDiUU/3LRVybNATLHxGStAzll9QY+rg== X-Received: by 2002:a17:90a:fb56:b0:226:37b4:db28 with SMTP id iq22-20020a17090afb5600b0022637b4db28mr15032793pjb.5.1672679422029; Mon, 02 Jan 2023 09:10:22 -0800 (PST) Received: from localhost.localdomain ([116.58.254.36]) by smtp.gmail.com with ESMTPSA id t8-20020a17090a448800b001fd6066284dsm17272871pjg.6.2023.01.02.09.10.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Jan 2023 09:10:21 -0800 (PST) From: Dmitrii Bundin To: jan.kiszka@siemens.com Cc: akpm@linux-foundation.org, dmitrii.bundin.a@gmail.com, gregkh@linuxfoundation.org, kbingham@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, mingo@redhat.com, rppt@kernel.org, vbabka@suse.cz, x86@kernel.org Subject: [PATCH v4] scripts/gdb: add mm introspection utils Date: Mon, 2 Jan 2023 20:10:14 +0300 Message-Id: <20230102171014.31408-1-dmitrii.bundin.a@gmail.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <16280f8e-31c9-7b0b-b0c1-4d180c4d0045@siemens.com> References: <16280f8e-31c9-7b0b-b0c1-4d180c4d0045@siemens.com> X-Stat-Signature: 5y6ssigmtq9gjhoo3dnwm8d6648jqwg9 X-Rspam-User: X-Rspamd-Queue-Id: 538291C0018 X-Rspamd-Server: rspam06 X-HE-Tag: 1672679423-644584 X-HE-Meta: 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 4lCZsAet qDIm+ZdvAqwGY+OOIzQ7ot8+EXSGh5O/8iejicQxUXTriOKuoTJPsIW17TROfb8m4qYTWBmXDD3FAYNdZXfRVJUc9G2TUEOniyTrPYcgdbOA63JpJL+ihlONibw84rThz0HIBPQ7jlEVja4Uq6i3H6laxUoBsD9MA2qY8uvxVSSv61HGHLBdTKLgi7RyDvEPpd6uI X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: This command provides a way to traverse the entire page hierarchy by a given virtual address on x86. In addition to qemu's commands info tlb/info mem it provides the complete information about the paging structure for an arbitrary virtual address. It supports 4KB/2MB/1GB and 5 level paging. Here is an example output for 2MB success translation: (gdb) translate-vm address cr3: cr3 binary data 0x10a1f8004 next entry physicall address 0x10a1f8000 --- bit 3 page level write through False bit 4 page level cache disabled False level 4: entry address 0xffff88810a1f87f0 page entry binary data 0x8000000109042067 next entry physicall address 0x109042000 --- bit 0 entry present True bit 1 read/write access allowed True bit 2 user access allowed True bit 3 page level write through False bit 4 page level cache disabled False bit 5 entry has been accessed True bit 7 page size False bit 11 restart to ordinary False bit 63 execute disable True level 3: entry address 0xffff888109042e40 page entry binary data 0x10ec93067 next entry physicall address 0x10ec93000 --- bit 0 entry present True bit 1 read/write access allowed True bit 2 user access allowed True bit 3 page level write through False bit 4 page level cache disabled False bit 5 entry has been accessed True bit 7 page size False bit 11 restart to ordinary False bit 63 execute disable False level 2: entry address 0xffff88810ec939a8 page entry binary data 0x800000012b6008e7 page size 2MB page physicall address 0x12b600000 --- bit 0 entry present True bit 1 read/write access allowed True bit 2 user access allowed True bit 3 page level write through False bit 4 page level cache disabled False bit 5 entry has been accessed True bit 6 page dirty True bit 7 page size True bit 8 global translation False bit 11 restart to ordinary True bit 12 pat False bits (59, 62) protection key 0 bit 63 execute disable True Signed-off-by: Dmitrii Bundin --- Changes in v2: https://lore.kernel.org/all/20221230163512.23736-1-dmitrii.bundin.a@gmail.com/ - Fix commit message to mention x86 explicitly - Assign page_offset_base to a constant in case CONFIG_DYNAMIC_MEMORY_LAYOUT is disabled Changes in v3: https://lore.kernel.org/all/20221231171258.7907-1-dmitrii.bundin.a@gmail.com/ - Make debug output lower case and column aligned Changes in v4: https://lore.kernel.org/all/20230101172312.21452-1-dmitrii.bundin.a@gmail.com/ - Added currently supported archs in the command help - Remove excessive newline scripts/gdb/linux/mm.py | 223 +++++++++++++++++++++++++++++++++++++ scripts/gdb/vmlinux-gdb.py | 1 + 2 files changed, 224 insertions(+) create mode 100644 scripts/gdb/linux/mm.py diff --git a/scripts/gdb/linux/mm.py b/scripts/gdb/linux/mm.py new file mode 100644 index 000000000000..2a0b6cb6a1f8 --- /dev/null +++ b/scripts/gdb/linux/mm.py @@ -0,0 +1,223 @@ +# +# gdb helper commands and functions for Linux kernel debugging +# +# routines to introspect page table +# +# Authors: +# Dmitrii Bundin +# +# This work is licensed under the terms of the GNU GPL version 2. +# + +import gdb + +from linux import utils + +PHYSICAL_ADDRESS_MASK = gdb.parse_and_eval('0xfffffffffffff') + + +def page_mask(level=1): + # 4KB + if level == 1: + return gdb.parse_and_eval('(u64) ~0xfff') + # 2MB + elif level == 2: + return gdb.parse_and_eval('(u64) ~0x1fffff') + # 1GB + elif level == 3: + return gdb.parse_and_eval('(u64) ~0x3fffffff') + else: + raise Exception(f'Unknown page level: {level}') + + +#page_offset_base in case CONFIG_DYNAMIC_MEMORY_LAYOUT is disabled +POB_NO_DYNAMIC_MEM_LAYOUT = '0xffff888000000000' +def _page_offset_base(): + pob_symbol = gdb.lookup_global_symbol('page_offset_base') + pob = pob_symbol.name if pob_symbol else POB_NO_DYNAMIC_MEM_LAYOUT + return gdb.parse_and_eval(pob) + + +def is_bit_defined_tupled(data, offset): + return offset, bool(data >> offset & 1) + +def content_tupled(data, bit_start, bit_end): + return (bit_start, bit_end), data >> bit_start & ((1 << (1 + bit_end - bit_start)) - 1) + +def entry_va(level, phys_addr, translating_va): + def start_bit(level): + if level == 5: + return 48 + elif level == 4: + return 39 + elif level == 3: + return 30 + elif level == 2: + return 21 + elif level == 1: + return 12 + else: + raise Exception(f'Unknown level {level}') + + entry_offset = ((translating_va >> start_bit(level)) & 511) * 8 + entry_va = _page_offset_base() + phys_addr + entry_offset + return entry_va + +class Cr3(): + def __init__(self, cr3, page_levels): + self.cr3 = cr3 + self.page_levels = page_levels + self.page_level_write_through = is_bit_defined_tupled(cr3, 3) + self.page_level_cache_disabled = is_bit_defined_tupled(cr3, 4) + self.next_entry_physical_address = cr3 & PHYSICAL_ADDRESS_MASK & page_mask() + + def next_entry(self, va): + next_level = self.page_levels + return PageHierarchyEntry(entry_va(next_level, self.next_entry_physical_address, va), next_level) + + def mk_string(self): + return f"""\ +cr3: + {'cr3 binary data': <30} {hex(self.cr3)} + {'next entry physicall address': <30} {hex(self.next_entry_physical_address)} + --- + {'bit' : <4} {self.page_level_write_through[0]: <10} {'page level write through': <30} {self.page_level_write_through[1]} + {'bit' : <4} {self.page_level_cache_disabled[0]: <10} {'page level cache disabled': <30} {self.page_level_cache_disabled[1]} +""" + + +class PageHierarchyEntry(): + def __init__(self, address, level): + data = int.from_bytes( + memoryview(gdb.selected_inferior().read_memory(address, 8)), + "little" + ) + if level == 1: + self.is_page = True + self.entry_present = is_bit_defined_tupled(data, 0) + self.read_write = is_bit_defined_tupled(data, 1) + self.user_access_allowed = is_bit_defined_tupled(data, 2) + self.page_level_write_through = is_bit_defined_tupled(data, 3) + self.page_level_cache_disabled = is_bit_defined_tupled(data, 4) + self.entry_was_accessed = is_bit_defined_tupled(data, 5) + self.dirty = is_bit_defined_tupled(data, 6) + self.pat = is_bit_defined_tupled(data, 7) + self.global_translation = is_bit_defined_tupled(data, 8) + self.page_physical_address = data & PHYSICAL_ADDRESS_MASK & page_mask(level) + self.next_entry_physical_address = None + self.hlat_restart_with_ordinary = is_bit_defined_tupled(data, 11) + self.protection_key = content_tupled(data, 59, 62) + self.executed_disable = is_bit_defined_tupled(data, 63) + else: + page_size = is_bit_defined_tupled(data, 7) + page_size_bit = page_size[1] + self.is_page = page_size_bit + self.entry_present = is_bit_defined_tupled(data, 0) + self.read_write = is_bit_defined_tupled(data, 1) + self.user_access_allowed = is_bit_defined_tupled(data, 2) + self.page_level_write_through = is_bit_defined_tupled(data, 3) + self.page_level_cache_disabled = is_bit_defined_tupled(data, 4) + self.entry_was_accessed = is_bit_defined_tupled(data, 5) + self.page_size = page_size + self.dirty = is_bit_defined_tupled( + data, 6) if page_size_bit else None + self.global_translation = is_bit_defined_tupled( + data, 8) if page_size_bit else None + self.pat = is_bit_defined_tupled( + data, 12) if page_size_bit else None + self.page_physical_address = data & PHYSICAL_ADDRESS_MASK & page_mask(level) if page_size_bit else None + self.next_entry_physical_address = None if page_size_bit else data & PHYSICAL_ADDRESS_MASK & page_mask() + self.hlat_restart_with_ordinary = is_bit_defined_tupled(data, 11) + self.protection_key = content_tupled(data, 59, 62) if page_size_bit else None + self.executed_disable = is_bit_defined_tupled(data, 63) + self.address = address + self.page_entry_binary_data = data + self.page_hierarchy_level = level + + def next_entry(self, va): + if self.is_page or not self.entry_present[1]: + return None + + next_level = self.page_hierarchy_level - 1 + return PageHierarchyEntry(entry_va(next_level, self.next_entry_physical_address, va), next_level) + + + def mk_string(self): + if not self.entry_present[1]: + return f"""\ +level {self.page_hierarchy_level}: + {'entry address': <30} {hex(self.address)} + {'page entry binary data': <30} {hex(self.page_entry_binary_data)} + --- + PAGE ENTRY IS NOT PRESENT! +""" + elif self.is_page: + def page_size_line(ps_bit, ps, level): + return "" if level == 1 else f"{'bit': <3} {ps_bit: <5} {'page size': <30} {ps}" + + return f"""\ +level {self.page_hierarchy_level}: + {'entry address': <30} {hex(self.address)} + {'page entry binary data': <30} {hex(self.page_entry_binary_data)} + {'page size': <30} {'1GB' if self.page_hierarchy_level == 3 else '2MB' if self.page_hierarchy_level == 2 else '4KB' if self.page_hierarchy_level == 1 else 'Unknown page size for level:' + self.page_hierarchy_level} + {'page physicall address': <30} {hex(self.page_physical_address)} + --- + {'bit': <4} {self.entry_present[0]: <10} {'entry present': <30} {self.entry_present[1]} + {'bit': <4} {self.read_write[0]: <10} {'read/write access allowed': <30} {self.read_write[1]} + {'bit': <4} {self.user_access_allowed[0]: <10} {'user access allowed': <30} {self.user_access_allowed[1]} + {'bit': <4} {self.page_level_write_through[0]: <10} {'page level write through': <30} {self.page_level_write_through[1]} + {'bit': <4} {self.page_level_cache_disabled[0]: <10} {'page level cache disabled': <30} {self.page_level_cache_disabled[1]} + {'bit': <4} {self.entry_was_accessed[0]: <10} {'entry has been accessed': <30} {self.entry_was_accessed[1]} + {"" if self.page_hierarchy_level == 1 else f"{'bit': <4} {self.page_size[0]: <10} {'page size': <30} {self.page_size[1]}"} + {'bit': <4} {self.dirty[0]: <10} {'page dirty': <30} {self.dirty[1]} + {'bit': <4} {self.global_translation[0]: <10} {'global translation': <30} {self.global_translation[1]} + {'bit': <4} {self.hlat_restart_with_ordinary[0]: <10} {'restart to ordinary': <30} {self.hlat_restart_with_ordinary[1]} + {'bit': <4} {self.pat[0]: <10} {'pat': <30} {self.pat[1]} + {'bits': <4} {str(self.protection_key[0]): <10} {'protection key': <30} {self.protection_key[1]} + {'bit': <4} {self.executed_disable[0]: <10} {'execute disable': <30} {self.executed_disable[1]} +""" + else: + return f"""\ +level {self.page_hierarchy_level}: + {'entry address': <30} {hex(self.address)} + {'page entry binary data': <30} {hex(self.page_entry_binary_data)} + {'next entry physicall address': <30} {hex(self.next_entry_physical_address)} + --- + {'bit': <4} {self.entry_present[0]: <10} {'entry present': <30} {self.entry_present[1]} + {'bit': <4} {self.read_write[0]: <10} {'read/write access allowed': <30} {self.read_write[1]} + {'bit': <4} {self.user_access_allowed[0]: <10} {'user access allowed': <30} {self.user_access_allowed[1]} + {'bit': <4} {self.page_level_write_through[0]: <10} {'page level write through': <30} {self.page_level_write_through[1]} + {'bit': <4} {self.page_level_cache_disabled[0]: <10} {'page level cache disabled': <30} {self.page_level_cache_disabled[1]} + {'bit': <4} {self.entry_was_accessed[0]: <10} {'entry has been accessed': <30} {self.entry_was_accessed[1]} + {'bit': <4} {self.page_size[0]: <10} {'page size': <30} {self.page_size[1]} + {'bit': <4} {self.hlat_restart_with_ordinary[0]: <10} {'restart to ordinary': <30} {self.hlat_restart_with_ordinary[1]} + {'bit': <4} {self.executed_disable[0]: <10} {'execute disable': <30} {self.executed_disable[1]} +""" + + +class TranslateVM(gdb.Command): + """Prints the entire paging structure used to translate a given virtual address. + +Having an address space of the currently executed process translates the virtual address +and prints detailed information of all paging structure levels used for the transaltion. +Currently supported arch: x86""" + + def __init__(self): + super(TranslateVM, self).__init__('translate-vm', gdb.COMMAND_USER) + + def invoke(self, arg, from_tty): + if utils.is_target_arch("x86"): + vm_address = gdb.parse_and_eval(f'{arg}') + cr3_data = gdb.parse_and_eval('$cr3') + cr4 = gdb.parse_and_eval('$cr4') + page_levels = 5 if cr4 & (1 << 12) else 4 + page_entry = Cr3(cr3_data, page_levels) + while page_entry: + gdb.write(page_entry.mk_string()) + page_entry = page_entry.next_entry(vm_address) + else: + gdb.GdbError("Virtual address translation is not" + "supported for this arch") + + +TranslateVM() diff --git a/scripts/gdb/vmlinux-gdb.py b/scripts/gdb/vmlinux-gdb.py index 4136dc2c59df..27bd7339bccc 100644 --- a/scripts/gdb/vmlinux-gdb.py +++ b/scripts/gdb/vmlinux-gdb.py @@ -37,3 +37,4 @@ else: import linux.clk import linux.genpd import linux.device + import linux.mm -- 2.17.1