From: Mark Rutland <[email protected]>

When KVM traps an unhandled sysreg/coproc access from a guest, it logs
the guest PC. To aid debugging, it would be helpful to know which
exception level the trap came from, along with other PSTATE/CPSR bits,
so let's log the PSTATE/CPSR too.

Acked-by: Christoffer Dall <[email protected]>
Signed-off-by: Mark Rutland <[email protected]>
Signed-off-by: Marc Zyngier <[email protected]>
---
 arch/arm/kvm/coproc.c     | 4 ++--
 arch/arm64/kvm/sys_regs.c | 8 ++++----
 2 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/arch/arm/kvm/coproc.c b/arch/arm/kvm/coproc.c
index cb094e55dc5f..222c1635bc7a 100644
--- a/arch/arm/kvm/coproc.c
+++ b/arch/arm/kvm/coproc.c
@@ -602,8 +602,8 @@ static int emulate_cp15(struct kvm_vcpu *vcpu,
                }
        } else {
                /* If access function fails, it should complain. */
-               kvm_err("Unsupported guest CP15 access at: %08lx\n",
-                       *vcpu_pc(vcpu));
+               kvm_err("Unsupported guest CP15 access at: %08lx [%08lx]\n",
+                       *vcpu_pc(vcpu), *vcpu_cpsr(vcpu));
                print_cp_instr(params);
                kvm_inject_undefined(vcpu);
        }
diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
index 22fbbdbece3c..ecbf67ccabf5 100644
--- a/arch/arm64/kvm/sys_regs.c
+++ b/arch/arm64/kvm/sys_regs.c
@@ -1912,8 +1912,8 @@ static void unhandled_cp_access(struct kvm_vcpu *vcpu,
                WARN_ON(1);
        }
 
-       kvm_err("Unsupported guest CP%d access at: %08lx\n",
-               cp, *vcpu_pc(vcpu));
+       kvm_err("Unsupported guest CP%d access at: %08lx [%08lx]\n",
+               cp, *vcpu_pc(vcpu), *vcpu_cpsr(vcpu));
        print_sys_reg_instr(params);
        kvm_inject_undefined(vcpu);
 }
@@ -2063,8 +2063,8 @@ static int emulate_sys_reg(struct kvm_vcpu *vcpu,
        if (likely(r)) {
                perform_access(vcpu, params, r);
        } else {
-               kvm_err("Unsupported guest sys_reg access at: %lx\n",
-                       *vcpu_pc(vcpu));
+               kvm_err("Unsupported guest sys_reg access at: %lx [%08lx]\n",
+                       *vcpu_pc(vcpu), *vcpu_cpsr(vcpu));
                print_sys_reg_instr(params);
                kvm_inject_undefined(vcpu);
        }
-- 
2.19.2

_______________________________________________
kvmarm mailing list
[email protected]
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

Reply via email to