Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp1163835rda; Mon, 23 Oct 2023 04:51:37 -0700 (PDT) X-Google-Smtp-Source: AGHT+IG0p+mBs9jfYPq6pduFOC5Rhmwhp6/V1o42UHHHCqigsOYR232iKGzOBxBMoYkCCvYWg+Lf X-Received: by 2002:a17:90a:ec0f:b0:27d:1051:83c4 with SMTP id l15-20020a17090aec0f00b0027d105183c4mr6143225pjy.12.1698061897004; Mon, 23 Oct 2023 04:51:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698061896; cv=none; d=google.com; s=arc-20160816; b=PWhihlq5U/cCPO5htJSUK1Wj8yLkCTJl0qJQAk9jbzyCIjaCIj2UG+o9ZY+ecPz7Qb 6w6FCymJK4J1J3B/z6ljg/N6b/hpPoWemveEhuGknP0Im0l20dWUQbOSQxFX/8gDkyOr AETI1RGsVdoxHmH0uEbEjU1kB7tsRNhI9KpQTlSuo04f465mky2pixCQBjXRAHQjdDW7 nRxdWcKvctm4v5Ob1es2AVM4rq/mdJoS0MllbMvO6uZM9FCDMHyGjx5olt24jAIxcQQ7 UdMUvCp7lOqoZ+BLe0FCAjlObyMYtSJ7yGCPd0O8mZk6odkQPDNwOrH3eRdvYah2CxXk ArrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=yUDOTnIfVBdl4hZszKe+J7KJuVitMxRfHzvvT+rgTsk=; fh=DFPnDq2cx+hgqp1yrQ9Laae/MsEoRqwrGgkRKdTDxsQ=; b=kckzAvF/PMT83LRYxe61OYEaUKuWBhWrbYdsFSzoURJPXNA6Ti4nP3rn5TekWiQdvr lfa1UYCgbeqrslWgBOe6sKupAsRwN4MdaTXQwAXCVNjZq4TP33oxxtqPEvcNTm7r64Vn sjNV6DvlvaBhnP5TGsidRn+rUejZ5ZsmUUFeQmXC3FVH65+CowdQbzAvvIRoyqGOCfeG FssH1iy06jm+s9LoHmsfeCL2nsycUmk1CVxrV9Jc8CzkDjB2zwyFwcYS3/42Lbg4/NX3 A60hrDDwTiSRsTqpFYyBp7aIcS/AK1SvARhYgESFI7k9gjQi5TkaE6h1/jGxBMRBPvfA uIqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xzp9588D; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id my18-20020a17090b4c9200b002774d978e19si6661919pjb.175.2023.10.23.04.51.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Oct 2023 04:51:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Xzp9588D; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id D0F6280AC475; Mon, 23 Oct 2023 04:51:29 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234627AbjJWLvK (ORCPT + 99 others); Mon, 23 Oct 2023 07:51:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234617AbjJWLvI (ORCPT ); Mon, 23 Oct 2023 07:51:08 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CADDC10C; Mon, 23 Oct 2023 04:51:03 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4906CC433C8; Mon, 23 Oct 2023 11:51:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1698061863; bh=Lvnm2WrJgn8H62gGFxkFpvYWq1VX/8h9h5UM6WmVuYk=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=Xzp9588D9keUB7FeGsWPoIZuGg+1/wa9m2PIzC6KJBTuJyv4T0Ft09SWqkfFmOP3K 6Y6dSrUHnCeEQRgQLafM0KhYlJO9WXb2WjEjfksB4vIAaMbQ1l22tuqcpnBqd9TuDB 8kzbThXqFv19rUYergpL2JEDRm2dMPbQJ1p78fwGuikHxLdWv6G9wqY5FMUmCdO6jd 3k0OXvY308DarBUpxE7FYjf9XukPPzqKrRLpA5GZYDYADWBiDTOk3zLngM5Sf07iZx EOHmAFI3Z8CPuSHHF4qpEeczTbMnab+Rm9Tcet9wqGT1br5l/HxTd2oDLxnrHQOXr1 Bf6FBVNXtrZ4w== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1qutSX-006pRc-27; Mon, 23 Oct 2023 12:51:01 +0100 Date: Mon, 23 Oct 2023 12:50:59 +0100 Message-ID: <861qdl5zh8.wl-maz@kernel.org> From: Marc Zyngier To: Raghavendra Rao Ananta Cc: Oliver Upton , Alexandru Elisei , James Morse , Suzuki K Poulose , Paolo Bonzini , Zenghui Yu , Shaoqin Huang , Jing Zhang , Reiji Watanabe , Colton Lewis , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: Re: [PATCH v8 04/13] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU In-Reply-To: <20231020214053.2144305-5-rananta@google.com> References: <20231020214053.2144305-1-rananta@google.com> <20231020214053.2144305-5-rananta@google.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/29.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: rananta@google.com, oliver.upton@linux.dev, alexandru.elisei@arm.com, james.morse@arm.com, suzuki.poulose@arm.com, pbonzini@redhat.com, yuzenghui@huawei.com, shahuang@redhat.com, jingzhangos@google.com, reijiw@google.com, coltonlewis@google.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 23 Oct 2023 04:51:30 -0700 (PDT) On Fri, 20 Oct 2023 22:40:44 +0100, Raghavendra Rao Ananta wrote: > > The number of PMU event counters is indicated in PMCR_EL0.N. > For a vCPU with PMUv3 configured, the value is set to the same > value as the current PE on every vCPU reset. Unless the vCPU is > pinned to PEs that has the PMU associated to the guest from the > initial vCPU reset, the value might be different from the PMU's > PMCR_EL0.N on heterogeneous PMU systems. > > Fix this by setting the vCPU's PMCR_EL0.N to the PMU's PMCR_EL0.N > value. Track the PMCR_EL0.N per guest, as only one PMU can be set > for the guest (PMCR_EL0.N must be the same for all vCPUs of the > guest), and it is convenient for updating the value. > > To achieve this, the patch introduces a helper, > kvm_arm_pmu_get_max_counters(), that reads the maximum number of > counters from the arm_pmu associated to the VM. Make the function > global as upcoming patches will be interested to know the value > while setting the PMCR.N of the guest from userspace. > > KVM does not yet support userspace modifying PMCR_EL0.N. > The following patch will add support for that. > > Signed-off-by: Reiji Watanabe > Signed-off-by: Raghavendra Rao Ananta > --- > arch/arm64/include/asm/kvm_host.h | 3 +++ > arch/arm64/kvm/pmu-emul.c | 26 +++++++++++++++++++++++++- > arch/arm64/kvm/sys_regs.c | 28 ++++++++++++++-------------- > include/kvm/arm_pmu.h | 6 ++++++ > 4 files changed, 48 insertions(+), 15 deletions(-) > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index 846a7706e925c..5653d3553e3ee 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -290,6 +290,9 @@ struct kvm_arch { > > cpumask_var_t supported_cpus; > > + /* PMCR_EL0.N value for the guest */ > + u8 pmcr_n; > + > /* Hypercall features firmware registers' descriptor */ > struct kvm_smccc_features smccc_feat; > struct maple_tree smccc_filter; > diff --git a/arch/arm64/kvm/pmu-emul.c b/arch/arm64/kvm/pmu-emul.c > index 097bf7122130d..9e24581206c24 100644 > --- a/arch/arm64/kvm/pmu-emul.c > +++ b/arch/arm64/kvm/pmu-emul.c > @@ -690,6 +690,9 @@ void kvm_host_pmu_init(struct arm_pmu *pmu) > if (!entry) > goto out_unlock; > > + WARN_ON((pmu->num_events <= 0) || > + (pmu->num_events > ARMV8_PMU_MAX_COUNTERS)); > + So if we find a PMU that is completely bonkers (we *know* we cannot make use of it), we still pick it? What is the point? Honestly, I don't think this warning adds any value, and doesn't seem to be required for this patch anyway. > entry->arm_pmu = pmu; > list_add_tail(&entry->entry, &arm_pmus); > > @@ -873,11 +876,29 @@ static bool pmu_irq_is_valid(struct kvm *kvm, int irq) > return true; > } > > +/** > + * kvm_arm_pmu_get_max_counters - Return the max number of PMU counters. > + * @kvm: The kvm pointer > + */ > +int kvm_arm_pmu_get_max_counters(struct kvm *kvm) > +{ > + struct arm_pmu *arm_pmu = kvm->arch.arm_pmu; > + > + lockdep_assert_held(&kvm->arch.config_lock); > + > + /* > + * The arm_pmu->num_events considers the cycle counter as well. > + * Ignore that and return only the general-purpose counters. > + */ > + return arm_pmu->num_events - 1; How is that going to work when the PMU supports a fixed instruction counter, as it is the case with FEAT_PMUv3_ICNTR? The kernel doesn't support it yet, but this will eventually be the case, and this little game will break. > +} > + > static void kvm_arm_set_pmu(struct kvm *kvm, struct arm_pmu *arm_pmu) > { > lockdep_assert_held(&kvm->arch.config_lock); > > kvm->arch.arm_pmu = arm_pmu; > + kvm->arch.pmcr_n = kvm_arm_pmu_get_max_counters(kvm); Can you make the return type of kvm_arm_pmu_get_max_counters() homogeneous with that of pmcr_n? > } > > /** > @@ -1091,5 +1112,8 @@ u8 kvm_arm_pmu_get_pmuver_limit(void) > */ > u64 kvm_vcpu_read_pmcr(struct kvm_vcpu *vcpu) > { > - return __vcpu_sys_reg(vcpu, PMCR_EL0); > + u64 pmcr = __vcpu_sys_reg(vcpu, PMCR_EL0) & > + ~(ARMV8_PMU_PMCR_N_MASK << ARMV8_PMU_PMCR_N_SHIFT); > + > + return pmcr | ((u64)vcpu->kvm->arch.pmcr_n << ARMV8_PMU_PMCR_N_SHIFT); > } > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c > index a31cecb3d29fb..faf97878dfbbb 100644 > --- a/arch/arm64/kvm/sys_regs.c > +++ b/arch/arm64/kvm/sys_regs.c > @@ -721,12 +721,7 @@ static u64 reset_pmu_reg(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r) > { > u64 n, mask = BIT(ARMV8_PMU_CYCLE_IDX); > > - /* No PMU available, any PMU reg may UNDEF... */ > - if (!kvm_arm_support_pmu_v3()) > - return 0; > - > - n = read_sysreg(pmcr_el0) >> ARMV8_PMU_PMCR_N_SHIFT; > - n &= ARMV8_PMU_PMCR_N_MASK; > + n = vcpu->kvm->arch.pmcr_n; > if (n) > mask |= GENMASK(n - 1, 0); > > @@ -762,17 +757,15 @@ static u64 reset_pmselr(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r) > > static u64 reset_pmcr(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r) > { > - u64 pmcr; > + u64 pmcr = 0; > > - /* No PMU available, PMCR_EL0 may UNDEF... */ > - if (!kvm_arm_support_pmu_v3()) > - return 0; > - > - /* Only preserve PMCR_EL0.N, and reset the rest to 0 */ > - pmcr = read_sysreg(pmcr_el0) & (ARMV8_PMU_PMCR_N_MASK << ARMV8_PMU_PMCR_N_SHIFT); > if (!kvm_supports_32bit_el0()) > pmcr |= ARMV8_PMU_PMCR_LC; > > + /* > + * The value of PMCR.N field is included when the > + * vCPU register is read via kvm_vcpu_read_pmcr(). > + */ > __vcpu_sys_reg(vcpu, r->reg) = pmcr; > > return __vcpu_sys_reg(vcpu, r->reg); > @@ -1103,6 +1096,13 @@ static bool access_pmuserenr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > return true; > } > > +static int get_pmcr(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r, > + u64 *val) > +{ > + *val = kvm_vcpu_read_pmcr(vcpu); > + return 0; > +} > + > /* Silly macro to expand the DBG{BCR,BVR,WVR,WCR}n_EL1 registers in one go */ > #define DBG_BCR_BVR_WCR_WVR_EL1(n) \ > { SYS_DESC(SYS_DBGBVRn_EL1(n)), \ > @@ -2235,7 +2235,7 @@ static const struct sys_reg_desc sys_reg_descs[] = { > { SYS_DESC(SYS_SVCR), undef_access }, > > { PMU_SYS_REG(PMCR_EL0), .access = access_pmcr, > - .reset = reset_pmcr, .reg = PMCR_EL0 }, > + .reset = reset_pmcr, .reg = PMCR_EL0, .get_user = get_pmcr }, So since you don't provide a set_user() callback, userspace can still write anything it wants. Should we take this opportunity to sanitise things a bit? > { PMU_SYS_REG(PMCNTENSET_EL0), > .access = access_pmcnten, .reg = PMCNTENSET_EL0 }, > { PMU_SYS_REG(PMCNTENCLR_EL0), > diff --git a/include/kvm/arm_pmu.h b/include/kvm/arm_pmu.h > index cd980d78b86b5..2e90f38090e6d 100644 > --- a/include/kvm/arm_pmu.h > +++ b/include/kvm/arm_pmu.h > @@ -102,6 +102,7 @@ void kvm_vcpu_pmu_resync_el0(void); > > u8 kvm_arm_pmu_get_pmuver_limit(void); > int kvm_arm_set_default_pmu(struct kvm *kvm); > +int kvm_arm_pmu_get_max_counters(struct kvm *kvm); > > u64 kvm_vcpu_read_pmcr(struct kvm_vcpu *vcpu); > #else > @@ -181,6 +182,11 @@ static inline int kvm_arm_set_default_pmu(struct kvm *kvm) > return -ENODEV; > } > > +static inline int kvm_arm_pmu_get_max_counters(struct kvm *kvm) > +{ > + return -ENODEV; > +} > + > static inline u64 kvm_vcpu_read_pmcr(struct kvm_vcpu *vcpu) > { > return 0; Thanks, M. -- Without deviation from the norm, progress is not possible.