Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp457909img; Fri, 22 Mar 2019 01:32:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqwk+7F4blVROr+hZJMHhw1Ac0uGBIlR1N0W1vOl4HjA+MrkWMfJb8obUJtlOvfQRXmq5RrV X-Received: by 2002:a17:902:4301:: with SMTP id i1mr8351845pld.307.1553243573234; Fri, 22 Mar 2019 01:32:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553243573; cv=none; d=google.com; s=arc-20160816; b=kliOFmSVt08+Iu/tlVakFSYIhkrxoYZw3XeTIgZaLtKf/wxRwa76FLU14sGfI9/4pH LbNXN8tyhOImF40gtKYXgbkDynSJDEl903DOuEbM3tOicA4CQ3GC7Nd7FpkwwsFyH+XZ ZX4Tx4IKTwWbhq0mH2el1kqE3PkcdIIF7RasZJonR3tssRoin87XEiX1WXXUXHfswVEQ 6OriptKkEZolbm7BU8tGZjR3OW+IKr/cORVaAkNwZcPjrImrqqa2wqMYfeecNM85AZkJ 5J6GTpaGwOoqmAt3u90l9ghUMv/LY5KmppU5HBk3E+StJS4Oi7THk2HYsHSulgVpHuVZ VQxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=6TZ9e82dy2qQerLwYXtSF9q2jSKQsU366/RHG/gVEew=; b=xkbUN9DW5xox4PvrrfbuzM8YyfRoJoonkp5vRc9/v/y+dKZz+tjMLQ19KmhKlNoN8W +rmXPI7zOkXHpQVVGDM2zf/sMbSbVzLWQPpsO2iW8ePxER4AO8hhu9qXVIaAywx54h/A GHwBUiQJeIN7iT6HFie2yz4iRkAMlkiftyrSK/Ob68o78rccN2xK0CA9Y2Cfz6OQtgxV HTXrN47rkSvAPP0X2W9ClT+Uy5SdDh68Zv6vhd0zTMsxLPHbJ0BRH+FG1e3uFtCdyw3p 0iSreGZfGSoTcVzfZVS+tCF0RM33Jiwb/XkosJS5HFm9pgl9Ez7evbDwGxRVYa4pU/nb 7VDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o2si6129022pgh.565.2019.03.22.01.32.37; Fri, 22 Mar 2019 01:32:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727714AbfCVIbw (ORCPT + 99 others); Fri, 22 Mar 2019 04:31:52 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:40272 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726066AbfCVIbv (ORCPT ); Fri, 22 Mar 2019 04:31:51 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0A962A78; Fri, 22 Mar 2019 01:31:51 -0700 (PDT) Received: from [10.1.197.45] (e112298-lin.cambridge.arm.com [10.1.197.45]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C98263F59C; Fri, 22 Mar 2019 01:31:49 -0700 (PDT) Subject: Re: [PATCH] perf: Change PMCR write to read-modify-write To: Sodagudi Prasad Cc: will.deacon@arm.com, mingo@redhat.com, catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, peterz@infradead.org, linux-kernel@vger.kernel.org References: <1553134066-20272-1-git-send-email-psodagud@codeaurora.org> From: Julien Thierry Message-ID: Date: Fri, 22 Mar 2019 08:31:46 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21/03/2019 20:02, Sodagudi Prasad wrote: > On 2019-03-21 06:34, Julien Thierry wrote: >> Hi Prasad, >> >> On 21/03/2019 02:07, Prasad Sodagudi wrote: >>> Preserves the bitfields of PMCR_EL0(AArch64) during PMU reset. >>> Reset routine should write a 1 to PMCR.C and PMCR.P fields only >>> to reset the counters. Other fields should not be changed >>> as they could be set before PMU initialization and their >>> value must be preserved even after reset. >>> >> >> Are there any particular bit you are concerned about? Apart from the RO >> ones and the Res0 ones (to which we are already writing 0), I see: >> >> DP -> irrelevant for non-secure >> X -> This one is the only potentially interesting, however it resets to >> an architecturally unknown value, so unless we know for a fact it was >> set before hand, we probably want to clear it >> D -> ignored when we have LC set (and we do) >> E -> Since this is the function we use to reset the PMU on the current >> CPU, we probably want to set this bit to 0 regardless of its previous >> value >> >> So, is there any issue this patch is solving? > > Hi Julien, > > Thanks for taking a look into this patch. Yes. On our Qualcomm > platforms, observed that X bit is getting cleared by kernel. > This bit is getting set by firmware for Qualcomm use cases and > non-secure world is resetting without this patch. > I think, changing that register this register modifications to > read-modify-write style make sense. > Maybe for the X bit, but for the E bit this seems like the wrong thing to do. We want to set the E bit to 0 here. And for platforms that don't have a firmware touching the X bit (or rather the pmcr as a whole), I'd like to understand whether it would be valid to leave this bit set to an architecturally unknown value and preserving that value. Thanks, >>> Signed-off-by: Prasad Sodagudi >>> --- >>>  arch/arm64/kernel/perf_event.c | 4 ++-- >>>  1 file changed, 2 insertions(+), 2 deletions(-) >>> >>> diff --git a/arch/arm64/kernel/perf_event.c >>> b/arch/arm64/kernel/perf_event.c >>> index 4addb38..0c1afdd 100644 >>> --- a/arch/arm64/kernel/perf_event.c >>> +++ b/arch/arm64/kernel/perf_event.c >>> @@ -868,8 +868,8 @@ static void armv8pmu_reset(void *info) >>>       * Initialize & Reset PMNC. Request overflow interrupt for >>>       * 64 bit cycle counter but cheat in armv8pmu_write_counter(). >>>       */ >>> -    armv8pmu_pmcr_write(ARMV8_PMU_PMCR_P | ARMV8_PMU_PMCR_C | >>> -                ARMV8_PMU_PMCR_LC); >>> +    armv8pmu_pmcr_write(armv8pmu_pmcr_read() | ARMV8_PMU_PMCR_P | >>> +            ARMV8_PMU_PMCR_C | ARMV8_PMU_PMCR_LC); >>>  } >>> >>>  static int __armv8_pmuv3_map_event(struct perf_event *event, >>> > -- Julien Thierry