Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp637011imw; Wed, 13 Jul 2022 05:26:55 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sdOPyQQLQuqMzT0KZ3V8BblgcZUXWTcAXM7HHYLb5Ktb4TbAIGbT9Ee6bOIseBRUVMxYt6 X-Received: by 2002:a05:6a00:1312:b0:528:2948:e974 with SMTP id j18-20020a056a00131200b005282948e974mr2993754pfu.79.1657715214825; Wed, 13 Jul 2022 05:26:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657715214; cv=none; d=google.com; s=arc-20160816; b=qaO1TdZCbx5zEMwGbSEQwGphw527mfBMhSGTxmuo/gm7cYXfK5j1t9GRMu5xKZdjma d3sgqoKppuKnQrsOxovdS7sJzF6WYR9uMW2w3GCj9xg5uvTBzNIo90bXK9/wuGCCVIPx 5zazPAHe6f+tb4ANUtfYhPmr4l69f+Im+dhawUG7H74JnV3bph9MQGajXz3FicJ1OENr wYcsBOlvPLvtowVwooKEwyVSbGhMCeM0U/soM4dGV+iOVPGQFHHNdwaGP73vD4sm9mdT aCcaLON41NaEu/UZZ+leOMs275N5uM8yWztzDn/HsgK6cBR9vWKr7bk7JJ12Q6Y6LQi/ PTBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=W2Ymzvwb3Lj3UDR8FEoGEW3sgMajOI43WY/5bRVgypE=; b=wANUO2CTgmn7pMk1mJAcSIKNnjsmIMQib1SZC+e2pqwIkMmMGx9AU3duVHgrFi3Xs6 yH6bD/npjkCHSkXH7CMslUQvCYXbO3EwU1bQmEXcL2OM68IvMMby127x+96v8MUVfT8E kMIefrMrfhPYqgebVk109uIly8b2KByKoZLZUK3DI5ZBmkyPt7vT6fpXGr1HRp9Hgq/9 rv/GNe0uB4gZmxvs/UCjem4/FdOLrWQ9ZqqG0Ke74wE84MjLQ+WZ3CYhxWDWJrDr5VNZ 0jYiXd2k2LL9gEGVENOPDqVzR2ze7EEXutuDNBGNVpAcVP6jl4NtFv5pTV3cTJTsryYo i6XA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c65-20020a633544000000b00412518c0203si17889326pga.763.2022.07.13.05.26.42; Wed, 13 Jul 2022 05:26:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236357AbiGMMMh (ORCPT + 99 others); Wed, 13 Jul 2022 08:12:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60778 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231236AbiGMMMf (ORCPT ); Wed, 13 Jul 2022 08:12:35 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7247D104034 for ; Wed, 13 Jul 2022 05:12:34 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 75F4A1424; Wed, 13 Jul 2022 05:12:34 -0700 (PDT) Received: from [10.163.47.157] (unknown [10.163.47.157]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6630C3F73D; Wed, 13 Jul 2022 05:12:31 -0700 (PDT) Message-ID: <87d3417b-dfc7-bf46-a1b6-7d0b660f8b51@arm.com> Date: Wed, 13 Jul 2022 17:42:27 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: Re: [PATCH v2] drivers/perf: arm_spe: Fix consistency of SYS_PMSCR_EL1.CX Content-Language: en-US To: Suzuki K Poulose , linux-arm-kernel@lists.infradead.org Cc: german.gomez@arm.com, james.clark@arm.com, Will Deacon , Mark Rutland , Alexey Budankov , linux-kernel@vger.kernel.org References: <20220713085925.2627533-1-anshuman.khandual@arm.com> <0bb4a26d-0480-70f0-4a56-451d2d85880b@arm.com> From: Anshuman Khandual In-Reply-To: <0bb4a26d-0480-70f0-4a56-451d2d85880b@arm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/13/22 15:36, Suzuki K Poulose wrote: > On 13/07/2022 09:59, Anshuman Khandual wrote: >> The arm_spe_pmu driver will enable SYS_PMSCR_EL1.CX in order to add CONTEXT >> packets into the traces, if the owner of the perf event runs with required >> capabilities i.e CAP_PERFMON or CAP_SYS_ADMIN via perfmon_capable() helper. >> >> The value of this bit is computed in the arm_spe_event_to_pmscr() function >> but the check for capabilities happens in the pmu event init callback i.e >> arm_spe_pmu_event_init(). This suggests that the value of the CX bit should >> remain consistent for the duration of the perf session. >> >> However, the function arm_spe_event_to_pmscr() may be called later during >> the event start callback i.e arm_spe_pmu_start() when the "current" process >> is not the owner of the perf session, hence the CX bit setting is currently >> not consistent. >> >> One way to fix this, is by caching the required value of the CX bit during >> the initialization of the PMU event, so that it remains consistent for the >> duration of the session. It uses currently unused 'event->hw.flags' element >> to cache perfmon_capable() value, which can be referred during event start >> callback to compute SYS_PMSCR_EL1.CX. This ensures consistent availability >> of context packets in the trace as per event owner capabilities. >> >> Cc: Will Deacon >> Cc: Mark Rutland >> Cc: Alexey Budankov >> Cc: linux-arm-kernel@lists.infradead.org >> Cc: linux-kernel@vger.kernel.org >> Fixes: cea7d0d4a59b ("drivers/perf: Open access for CAP_PERFMON privileged process") >> Reported-by: German Gomez >> Signed-off-by: Anshuman Khandual >> --- >> Changes in V2: >> >> - Moved CONFIG_PID_IN_CONTEXTIDR config check inside the helper per Suzuki >> - Changed the comment per Suzuki >> - Renamed the helpers Per Suzuki >> - Added "Fixes: " tag per German >> >> Changes in V1: >> >> https://lore.kernel.org/all/20220712051404.2546851-1-anshuman.khandual@arm.com/ >> >>   drivers/perf/arm_spe_pmu.c | 23 +++++++++++++++++++++-- >>   1 file changed, 21 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c >> index db670b265897..c4290b0492fd 100644 >> --- a/drivers/perf/arm_spe_pmu.c >> +++ b/drivers/perf/arm_spe_pmu.c >> @@ -39,6 +39,24 @@ >>   #include >>   #include >>   +/* >> + * Cache if the event is allowed to trace Context information. >> + * This allows us to perform the check, i.e, perfmon_capable(), >> + * in the context of the event owner, once, during the event_init(). >> + */ >> +#define SPE_PMU_HW_FLAGS_CX            BIT(0) >> + >> +static void set_spe_event_has_cx(struct perf_event *event) >> +{ >> +    if (IS_ENABLED(CONFIG_PID_IN_CONTEXTIDR) && perfmon_capable()) >> +        event->hw.flags |= SPE_PMU_HW_FLAGS_CX; >> +} >> + >> +static bool get_spe_event_has_cx(struct perf_event *event) >> +{ >> +    return !!(event->hw.flags & SPE_PMU_HW_FLAGS_CX); >> +} >> + >>   #define ARM_SPE_BUF_PAD_BYTE            0 >>     struct arm_spe_pmu_buf { >> @@ -272,7 +290,7 @@ static u64 arm_spe_event_to_pmscr(struct perf_event *event) >>       if (!attr->exclude_kernel) >>           reg |= BIT(SYS_PMSCR_EL1_E1SPE_SHIFT); >>   -    if (IS_ENABLED(CONFIG_PID_IN_CONTEXTIDR) && perfmon_capable()) >> +    if (get_spe_event_has_cx(event)) >>           reg |= BIT(SYS_PMSCR_EL1_CX_SHIFT); >>         return reg; >> @@ -710,7 +728,8 @@ static int arm_spe_pmu_event_init(struct perf_event *event) >>           return -EOPNOTSUPP; >>   > > > >>       reg = arm_spe_event_to_pmscr(event); >> -    if (!perfmon_capable() && >> +    set_spe_event_has_cx(event); > > This seems to be wrong. We need to set the event_has_cx() *before* > we call arm_spe_event_to_pmscr(), as the latter uses > get_spe_event_has_cx(). Right, the order needs to be reversed. > >> +    if (!get_spe_event_has_cx(event) && >>           (reg & (BIT(SYS_PMSCR_EL1_PA_SHIFT) | > > And we must retain the perfmon_capable() check here to ensure that any of the following options are usable without CX. e.g, > if CONFIG_PID_IN_CONTEXTIDR is not enabled, !get_spe_event_has_cx() doesn't imply !perfmon_capable(). Right, but BIT(SYS_PMSCR_EL1_CX_SHIFT) check could be dropped here because that could not have been set in function arm_spe_event_to_pmscr() without perfmon_capable() ? > > >>               BIT(SYS_PMSCR_EL1_CX_SHIFT) | >>               BIT(SYS_PMSCR_EL1_PCT_SHIFT)))) > > Suzuki