Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp626861imm; Wed, 13 Jun 2018 06:02:59 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJykAkkggAmZKE8vTV6wasORRj39nHA/IfJPvyg97IfxHbtiGJZ0xNsCj1H5BZEqvfOmTP6 X-Received: by 2002:a63:3488:: with SMTP id b130-v6mr4011844pga.396.1528894979023; Wed, 13 Jun 2018 06:02:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528894978; cv=none; d=google.com; s=arc-20160816; b=ibuwYQUUunb4meYmETzwbEpi8Lhd8lne3pkGMynCVyq5H8q2ZgAHTpJyfoUXICYD/z z1hEjmboFrp4ZvkIDpLpZYHdDgm3MawhS8dZj1GxG/V1dDPjIL6sFuujXjLDZ6J4OD6s xjTpJ1R6GrvTQXzBT6iPDdJB2fmEYdkVY1rNlLf8gMMX9Kdc8H+T+1ckqJpancJga9IY kcsG43wXBm/BEcHkaX0RTJXfok+Tnk8fYABsWwCbimP7NmwC8I2RnEngVzhAgObwPz3Z 1uRaVWGuz+XWy1njIGOJtbs2wZSSB7lQUDd5Zc0oTG2+kT6vg/T+VqOntEx8P7nGy++v YYEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=lZCm2MtbFCOsPiq1T3arQxeio9DBxAW8TtHg6j5CjLA=; b=s+EWprHNQKbVAIZ3mvyJRmSMLmFdR6TPNR6kP3McrnoDmWlHnYMia6sPwPfL2E+QRY UVKXLcP/vpPAg+XpNniS3pr7CDNQTaZ/JeZDxUDXbsFoGmmanCFCzywpCQ0yC/9Ol3ew Xopy+h6L6trOFzWfEOIWwJlMsJVbD+9zWIMWEm2Kr328bBl7V/B/+HRWOIaF3QcEl99L 884mW5KFyKkkV6mMsfz1Qjr3qP4sjlWl+jAVLUyCkPlGQl9E497BMzDXlNnLXfoH2Ppf VwQbTT7i8Qbr4R2BBuLzJc72q2iC7SDETO6D0lot0434h7TEaLzdfRBbD7UP5Z5guNf/ ZbBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t5-v6si2956589plj.112.2018.06.13.06.02.43; Wed, 13 Jun 2018 06:02:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935576AbeFMNCA (ORCPT + 99 others); Wed, 13 Jun 2018 09:02:00 -0400 Received: from foss.arm.com ([217.140.101.70]:47304 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935351AbeFMNB7 (ORCPT ); Wed, 13 Jun 2018 09:01:59 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0BE941529; Wed, 13 Jun 2018 06:01:59 -0700 (PDT) Received: from edgewater-inn.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id D23F03F25D; Wed, 13 Jun 2018 06:01:58 -0700 (PDT) Received: by edgewater-inn.cambridge.arm.com (Postfix, from userid 1000) id C45E31AE53AB; Wed, 13 Jun 2018 14:02:32 +0100 (BST) Date: Wed, 13 Jun 2018 14:02:32 +0100 From: Will Deacon To: Marc Zyngier Cc: Agustin Vega-Frias , Mark Rutland , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Jeremy Linton , Catalin Marinas , Lorenzo Pieralisi , timur@codeaurora.org Subject: Re: [RFC V2 3/3] perf: qcom: Add Falkor CPU PMU IMPLEMENTATION DEFINED event support Message-ID: <20180613130232.GA27675@arm.com> References: <1528379808-27970-1-git-send-email-agustinv@codeaurora.org> <1528379808-27970-4-git-send-email-agustinv@codeaurora.org> <20180612144055.m2h26n64spfm6k6o@lakrids.cambridge.arm.com> <9957219b64252d3b2e19724db04a1179@codeaurora.org> <20180613103555.GC26280@arm.com> <06c81a64-904f-59fa-5751-62818d6d2107@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <06c81a64-904f-59fa-5751-62818d6d2107@arm.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 13, 2018 at 01:59:58PM +0100, Marc Zyngier wrote: > On 13/06/18 11:35, Will Deacon wrote: > > On Tue, Jun 12, 2018 at 04:41:32PM -0400, Agustin Vega-Frias wrote: > >> On 2018-06-12 10:40, Mark Rutland wrote: > >>> On Thu, Jun 07, 2018 at 09:56:48AM -0400, Agustin Vega-Frias wrote: > >>>> Selection of these events can be envisioned as indexing them from > >>>> a 3D matrix: > >>>> - the first index selects a Region Event Selection Register > >>>> (PMRESRx_EL0) > >>>> - the second index selects a group from which only one event at a time > >>>> can be selected > >>>> - the third index selects the event > >>>> > >>>> The event is encoded into perf_event_attr.config as 0xPRCCG, where: > >>>> P [config:16 ] = prefix (flag that indicates a matrix-based > >>>> event) > >>>> R [config:12-15] = register (specifies the PMRESRx_EL0 instance) > >>>> G [config:0-3 ] = group (specifies the event group) > >>>> CC [config:4-11 ] = code (specifies the event) > >>>> > >>>> Events with the P flag set to zero are treated as common PMUv3 events > >>>> and are directly programmed into PMXEVTYPERx_EL0. > >>>> > >>>> The first two indexes are set combining the RESR and group number with > >>>> a base number and writing it into the architected PMXEVTYPER_EL0 > >>>> register. > >>>> The third index is set by writing the code into the bits corresponding > >>>> with the group into the appropriate IMPLEMENTATION DEFINED PMRESRx_EL0 > >>>> register. > >>> > >>> When are the IMP DEF registers accessible at EL0? Are those goverend by > >>> the same controls as the architected registers? > >> > >> No, there is a separate IMP DEF register to control access. > > > > Great :( We need to make sure we disable EL0 access during boot then, but > > that means we need to prove for the existence of this thing in head.S > > (since the PMU driver might not get loaded). > > > > Also, what's the kvm story here so that we don't accidentally open up a > > VM-VM side-channel via these registers? How do the EL1 trapping controls > > work? > > We'd trap the IMPDEF register access and inject an UNDEF (assuming that > the IMPDEF trapping works correctly). I have strictly no plan to support > this in a guest. Ah, so we could actually configure that in el2_setup and solve the host problem if we're entered at EL2. Agustin -- does that work, and what do we need to do if the host is entered at EL1? Will