From nobody Fri May 10 20:26:24 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1711132255; cv=none; d=zohomail.com; s=zohoarc; b=JK0UJ6k847gYk4AoXUmmPwGhyot0ewvKZrxIH72DTaBu3gzWAulBkIlB4gs7zDlloXbBJIZZdeRxJz6UvdJImtvS2yruTA/hea2BYwIe06l3/P2bxIBDyWOp3te1uK2tstxiQ84FZnPaRdC0IDxtQUzBBE2FthN9ijYEW8L27ww= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1711132255; h=Content-Type:Content-Transfer-Encoding:Date:Date:From:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:Subject:To:To:Message-Id:Reply-To:Cc; bh=lX1ZpNOz/f8WGgxXm5qvIzLIxCNZvJIgxvAaNK4StQY=; b=Ongy+a33e+oJPyyhtFvjpRelhOPMAHprpiNSBGNj9oVjJF75ZP+nTejlsSbmkgOpxlEKa96IFAwbwVOvhbfjA9bOqP+RAZOGS+7yblNLmsT5bRBAJ/OfDn6a1dAjSIab2YKy2YdI/MPzhw5u3eFPp3jbB+sArToDgeBXCZxjPpI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17111322549961.368242707826198; Fri, 22 Mar 2024 11:30:54 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1rnjf9-0003K0-6a; Fri, 22 Mar 2024 14:30:43 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rnjew-0003HJ-9E for qemu-devel@nongnu.org; Fri, 22 Mar 2024 14:30:36 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rnjeu-0003TZ-1o for qemu-devel@nongnu.org; Fri, 22 Mar 2024 14:30:29 -0400 Received: from mail-ed1-f69.google.com (mail-ed1-f69.google.com [209.85.208.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-657-F6pkCUMvM8aaYJuZ9laMdA-1; Fri, 22 Mar 2024 14:30:25 -0400 Received: by mail-ed1-f69.google.com with SMTP id 4fb4d7f45d1cf-568a3be9127so1530494a12.2 for ; Fri, 22 Mar 2024 11:30:25 -0700 (PDT) Received: from [192.168.10.118] ([151.95.49.219]) by smtp.gmail.com with ESMTPSA id df15-20020a05640230af00b00568d6a20717sm87664edb.52.2024.03.22.11.30.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Mar 2024 11:30:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1711132227; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=lX1ZpNOz/f8WGgxXm5qvIzLIxCNZvJIgxvAaNK4StQY=; b=ApX5z5Y4JRAay0FeBijJ1PcH+Tr2zhAMkHnAF50tBg1GhX4N4GQDufJxwjqLIoDg9BsyaS K/pGiDEEYdsZJ4zhyC39s1PxhyQBQn0QtCldGcVCfkGCDk2nRqjSQ5ZouxfL1HtxE1LwWN 2/wGdPKjT8oKOhPddep5iu/dM05yC5M= X-MC-Unique: F6pkCUMvM8aaYJuZ9laMdA-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711132223; x=1711737023; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=lX1ZpNOz/f8WGgxXm5qvIzLIxCNZvJIgxvAaNK4StQY=; b=XwZ6zNASzuACE2qdVw5Kvj86FKjXBILA07wmK14tosctD92Rj7IVgksH2E0E+928bl RZOpOQBZiM+qW0vZgjQ0lTz3fXxItCOQtrYyCMnS7/HRUit5uU4iHh6KjRHmqmelLScx 97+FUqK9j1M4IsTOjk4YDBpRSMCBDKzBCCVAdT/Kjgf8ApOiIiK6zOETIF1iaJzV+H3/ UjDHEOYy5HcCYsJeKedPsgH6TFQAwt/r9AVJ2U6IIVklsjS8V8SdUcLJJWJo9vZ0XHU0 ARcSo4opbYUz3CGiq2UV7qWZ6CXKheM6CAYDcKL6BCI10b6QJUGKyOGnt7z+W9Ld43cO yJIA== X-Gm-Message-State: AOJu0YxbpCKe6px0I574/6qp2SMj7lhe+TvfevXLHTahp4f/Q6usAN1p tlttY/TcWdYpU5ZyuLLMqkt8tAriWM2oIDYyMkg0C9KqK45VIFOM+fu9DG7oveo2V4QM79p1X35 rJjFk/9sdgew3iwx7KBZfOFr76wJ1vCpi0JcuQJU80waZfm9H6reh0qd9MHghTz1YAH8EWnuG/1 TMt7FyVHssyo2df9RylCM5QSM24TMEtpv0bK90 X-Received: by 2002:a50:f694:0:b0:568:b43c:d75d with SMTP id d20-20020a50f694000000b00568b43cd75dmr205469edn.25.1711132223247; Fri, 22 Mar 2024 11:30:23 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFva2n8gs4mlw09ih+0NxIUShp/zYcv4aD+lolFMqEYmJ1kbg5s/KIgkmJ8AJ5htEKeOdxdXg== X-Received: by 2002:a50:f694:0:b0:568:b43c:d75d with SMTP id d20-20020a50f694000000b00568b43cd75dmr205454edn.25.1711132222824; Fri, 22 Mar 2024 11:30:22 -0700 (PDT) From: Paolo Bonzini To: qemu-devel@nongnu.org Subject: [PATCH] kvm: use configs/ definition to conditionalize debug support Date: Fri, 22 Mar 2024 19:30:20 +0100 Message-ID: <20240322183020.1230736-1-pbonzini@redhat.com> X-Mailer: git-send-email 2.44.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=pbonzini@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.222, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1711132257098100001 Content-Type: text/plain; charset="utf-8" If an architecture adds support for KVM_CAP_SET_GUEST_DEBUG but QEMU does n= ot have the necessary code, QEMU will fail to build after updating kernel head= ers. Avoid this by using a #define in config-target.h instead of KVM_CAP_SET_GUE= ST_DEBUG. Signed-off-by: Paolo Bonzini --- configs/targets/aarch64-softmmu.mak | 1 + configs/targets/i386-softmmu.mak | 1 + configs/targets/ppc-softmmu.mak | 1 + configs/targets/ppc64-softmmu.mak | 1 + configs/targets/s390x-softmmu.mak | 1 + configs/targets/x86_64-softmmu.mak | 1 + include/sysemu/kvm.h | 2 +- include/sysemu/kvm_int.h | 2 +- accel/kvm/kvm-accel-ops.c | 4 ++-- accel/kvm/kvm-all.c | 10 +++++----- 10 files changed, 15 insertions(+), 9 deletions(-) diff --git a/configs/targets/aarch64-softmmu.mak b/configs/targets/aarch64-= softmmu.mak index b4338e95680..83c22391a69 100644 --- a/configs/targets/aarch64-softmmu.mak +++ b/configs/targets/aarch64-softmmu.mak @@ -1,5 +1,6 @@ TARGET_ARCH=3Daarch64 TARGET_BASE_ARCH=3Darm TARGET_SUPPORTS_MTTCG=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/aarch64-core.xml gdb-xml/aarch64-fpu.xml gdb-x= ml/arm-core.xml gdb-xml/arm-vfp.xml gdb-xml/arm-vfp3.xml gdb-xml/arm-vfp-sy= sregs.xml gdb-xml/arm-neon.xml gdb-xml/arm-m-profile.xml gdb-xml/arm-m-prof= ile-mve.xml gdb-xml/aarch64-pauth.xml TARGET_NEED_FDT=3Dy diff --git a/configs/targets/i386-softmmu.mak b/configs/targets/i386-softmm= u.mak index 6b3c99fc86c..d61b5076134 100644 --- a/configs/targets/i386-softmmu.mak +++ b/configs/targets/i386-softmmu.mak @@ -1,4 +1,5 @@ TARGET_ARCH=3Di386 TARGET_SUPPORTS_MTTCG=3Dy TARGET_NEED_FDT=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/i386-32bit.xml diff --git a/configs/targets/ppc-softmmu.mak b/configs/targets/ppc-softmmu.= mak index 774440108f7..f3ea9c98f75 100644 --- a/configs/targets/ppc-softmmu.mak +++ b/configs/targets/ppc-softmmu.mak @@ -1,4 +1,5 @@ TARGET_ARCH=3Dppc TARGET_BIG_ENDIAN=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/power-core.xml gdb-xml/power-fpu.xml gdb-xml/p= ower-altivec.xml gdb-xml/power-spe.xml TARGET_NEED_FDT=3Dy diff --git a/configs/targets/ppc64-softmmu.mak b/configs/targets/ppc64-soft= mmu.mak index ddf0c39617f..1db8d8381d0 100644 --- a/configs/targets/ppc64-softmmu.mak +++ b/configs/targets/ppc64-softmmu.mak @@ -2,5 +2,6 @@ TARGET_ARCH=3Dppc64 TARGET_BASE_ARCH=3Dppc TARGET_BIG_ENDIAN=3Dy TARGET_SUPPORTS_MTTCG=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/power64-core.xml gdb-xml/power-fpu.xml gdb-xml= /power-altivec.xml gdb-xml/power-spe.xml gdb-xml/power-vsx.xml TARGET_NEED_FDT=3Dy diff --git a/configs/targets/s390x-softmmu.mak b/configs/targets/s390x-soft= mmu.mak index 70d2f9f0ba0..b22218aacc8 100644 --- a/configs/targets/s390x-softmmu.mak +++ b/configs/targets/s390x-softmmu.mak @@ -1,4 +1,5 @@ TARGET_ARCH=3Ds390x TARGET_BIG_ENDIAN=3Dy TARGET_SUPPORTS_MTTCG=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/s390x-core64.xml gdb-xml/s390-acr.xml gdb-xml/= s390-fpr.xml gdb-xml/s390-vx.xml gdb-xml/s390-cr.xml gdb-xml/s390-virt.xml = gdb-xml/s390-virt-kvm.xml gdb-xml/s390-gs.xml diff --git a/configs/targets/x86_64-softmmu.mak b/configs/targets/x86_64-so= ftmmu.mak index 197817c9434..c5f882e5ba1 100644 --- a/configs/targets/x86_64-softmmu.mak +++ b/configs/targets/x86_64-softmmu.mak @@ -2,4 +2,5 @@ TARGET_ARCH=3Dx86_64 TARGET_BASE_ARCH=3Di386 TARGET_SUPPORTS_MTTCG=3Dy TARGET_NEED_FDT=3Dy +TARGET_KVM_HAVE_GUEST_DEBUG=3Dy TARGET_XML_FILES=3D gdb-xml/i386-64bit.xml diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h index 698f1640fe2..e4bdc1ff914 100644 --- a/include/sysemu/kvm.h +++ b/include/sysemu/kvm.h @@ -224,7 +224,7 @@ void kvm_flush_coalesced_mmio_buffer(void); * calling down to kvm_arch_update_guest_debug after the generic * fields have been set. */ -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG int kvm_update_guest_debug(CPUState *cpu, unsigned long reinject_trap); #else static inline int kvm_update_guest_debug(CPUState *cpu, unsigned long rein= ject_trap) diff --git a/include/sysemu/kvm_int.h b/include/sysemu/kvm_int.h index a5a3fee4119..3f3d13f8166 100644 --- a/include/sysemu/kvm_int.h +++ b/include/sysemu/kvm_int.h @@ -80,7 +80,7 @@ struct KVMState struct kvm_coalesced_mmio_ring *coalesced_mmio_ring; bool coalesced_flush_in_progress; int vcpu_events; -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG QTAILQ_HEAD(, kvm_sw_breakpoint) kvm_sw_breakpoints; #endif int max_nested_state_len; diff --git a/accel/kvm/kvm-accel-ops.c b/accel/kvm/kvm-accel-ops.c index 74e3c5785b5..94c828ac8da 100644 --- a/accel/kvm/kvm-accel-ops.c +++ b/accel/kvm/kvm-accel-ops.c @@ -85,7 +85,7 @@ static bool kvm_cpus_are_resettable(void) return !kvm_enabled() || !kvm_state->guest_state_protected; } =20 -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG static int kvm_update_guest_debug_ops(CPUState *cpu) { return kvm_update_guest_debug(cpu, 0); @@ -104,7 +104,7 @@ static void kvm_accel_ops_class_init(ObjectClass *oc, v= oid *data) ops->synchronize_state =3D kvm_cpu_synchronize_state; ops->synchronize_pre_loadvm =3D kvm_cpu_synchronize_pre_loadvm; =20 -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG ops->update_guest_debug =3D kvm_update_guest_debug_ops; ops->supports_guest_debug =3D kvm_supports_guest_debug; ops->insert_breakpoint =3D kvm_insert_breakpoint; diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index afd7f992e39..a7517bd6494 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -2427,7 +2427,7 @@ static int kvm_init(MachineState *ms) s->sigmask_len =3D 8; accel_blocker_init(); =20 -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG QTAILQ_INIT(&s->kvm_sw_breakpoints); #endif QLIST_INIT(&s->kvm_parked_vcpus); @@ -2617,7 +2617,7 @@ static int kvm_init(MachineState *ms) kvm_vm_attributes_allowed =3D (kvm_check_extension(s, KVM_CAP_VM_ATTRIBUTES) > 0); =20 -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG kvm_has_guest_debug =3D (kvm_check_extension(s, KVM_CAP_SET_GUEST_DEBUG) > 0); #endif @@ -2626,7 +2626,7 @@ static int kvm_init(MachineState *ms) if (kvm_has_guest_debug) { kvm_sstep_flags =3D SSTEP_ENABLE; =20 -#if defined KVM_CAP_SET_GUEST_DEBUG2 +#if defined TARGET_KVM_HAVE_GUEST_DEBUG int guest_debug_flags =3D kvm_check_extension(s, KVM_CAP_SET_GUEST_DEBUG2); =20 @@ -3309,7 +3309,7 @@ bool kvm_arm_supports_user_irq(void) return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ); } =20 -#ifdef KVM_CAP_SET_GUEST_DEBUG +#ifdef TARGET_KVM_HAVE_GUEST_DEBUG struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu, vaddr pc) { struct kvm_sw_breakpoint *bp; @@ -3469,7 +3469,7 @@ void kvm_remove_all_breakpoints(CPUState *cpu) } } =20 -#endif /* !KVM_CAP_SET_GUEST_DEBUG */ +#endif /* !TARGET_KVM_HAVE_GUEST_DEBUG */ =20 static int kvm_set_signal_mask(CPUState *cpu, const sigset_t *sigset) { --=20 2.44.0