Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp47554rdb; Thu, 16 Nov 2023 11:28:38 -0800 (PST) X-Google-Smtp-Source: AGHT+IEohPN4H6wviFST1pveJGTKjwAuBhJSyPXX2Ipx1m3j+9OHKuB5k3pM1qbHERMz8cPfkI92 X-Received: by 2002:a9d:6a4a:0:b0:6c6:4843:2abc with SMTP id h10-20020a9d6a4a000000b006c648432abcmr11260716otn.18.1700162917524; Thu, 16 Nov 2023 11:28:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700162917; cv=none; d=google.com; s=arc-20160816; b=md4KIUoQKYpw41Nj4IJLKuoJpKrcWzs32S854j06tsJUnvrs+fXB2NLsgCW7NIrt4c FjDeo9U5s4fY+SN3X9Cu5kwus0hnJpMMV1B5qjOvfWd7tTD43OiByFXhqn0T8dxw/C4y ncuh9nkUKVG1RmrHWzrecfjMVHtvTmUHW1r/xRC6aizE6aw5ZsNz/IJ8Z6uSBhlKNUVa oAm0UqwE+WFPyzzJFN5LV0NuAiMR3tMPoetnZJs3t7z1SL3MCwXasv7SBM+pn7CVe0wF IzssCTuo2YfJEB8C4C12YugEJl9cB/cATV8uBP6QvWXuiKa3lNfmHj7CF0GXBlZfBle+ FlpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=Qi3P3z2l/H0PlMr1bQFLaEgig0e9H/uE1yJ47Vtl2OU=; fh=rWd2KH6EifPkhJ/d5z0TCNWLzZxWxs8P8p5AEyWfn/c=; b=CZdeZk0/Pu53iYenfkxz3ZOVVDKNeyZ3vw/sRweDYsmyxaOfvcwIEBsn6nIkcXoNqV yNEW2fey8SpiTOoi7H+8Kj8S32IC7vXeg/MbN2FFwAVBlOOsxM9DmiZWxS8nUsRdsCt5 wOI4PPFvokoT1holLiaGLTLpo5F7B5vAHC/UAJiU8cFou5Cf2NmdvKRbva3gtJu7rT4q d8+bhsJwIvoWrUd1sLxCrUWCK7F9TWkeWuzJ/zXjgzPqOjwRnSWBfXSZpz81wyy+3dzI KMSq4Le2+FQACfCM8nr94N1VcFDJiPhpjIjsjNXP94OcrQNB52Sh1+FQWXgdBFWVysR/ u6Lg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id bq20-20020a056a02045400b0059beadab759si129542pgb.652.2023.11.16.11.28.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Nov 2023 11:28:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id C0906825F165; Thu, 16 Nov 2023 11:28:34 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345509AbjKPT2F (ORCPT + 99 others); Thu, 16 Nov 2023 14:28:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345486AbjKPT2E (ORCPT ); Thu, 16 Nov 2023 14:28:04 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 22ECF1A8 for ; Thu, 16 Nov 2023 11:28:00 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 17D431595; Thu, 16 Nov 2023 11:28:46 -0800 (PST) Received: from [10.57.84.40] (unknown [10.57.84.40]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E00B03F6C4; Thu, 16 Nov 2023 11:27:56 -0800 (PST) Message-ID: <9a794e3d-19e7-4b32-bce5-5ba54bf5a251@arm.com> Date: Thu, 16 Nov 2023 19:27:56 +0000 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 5/6] arm64: KVM: Write TRFCR value on guest switch with nVHE Content-Language: en-GB To: James Clark , coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, maz@kernel.org Cc: broonie@kernel.org, Oliver Upton , James Morse , Zenghui Yu , Catalin Marinas , Will Deacon , Mike Leach , Leo Yan , Alexander Shishkin , Anshuman Khandual , Rob Herring , Jintack Lim , Fuad Tabba , Akihiko Odaki , Joey Gouly , linux-kernel@vger.kernel.org References: <20231019165510.1966367-1-james.clark@arm.com> <20231019165510.1966367-6-james.clark@arm.com> From: Suzuki K Poulose In-Reply-To: <20231019165510.1966367-6-james.clark@arm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 16 Nov 2023 11:28:34 -0800 (PST) On 19/10/2023 17:55, James Clark wrote: > The guest value for TRFCR requested by the Coresight driver is saved > in sysregs[TRFCR_EL1]. On guest switch this value needs to be written to > the register. Currently TRFCR is only modified when we want to disable > trace completely in guests due to an issue with TRBE. Expand the > __debug_save_trace() function to always write to the register if a > different value for guests is required, but also keep the existing TRBE > disable behavior if that's required. > > The TRFCR restore function remains functionally the same, except a value > of 0 doesn't mean "don't restore" anymore. Now that we save both guest > and host values the register is restored any time the guest and host > values differ. > > Signed-off-by: James Clark Looks good to me. Reviewed-by: Suzuki K Poulose > --- > arch/arm64/include/asm/kvm_hyp.h | 6 ++- > arch/arm64/kvm/hyp/nvhe/debug-sr.c | 68 ++++++++++++++++++------------ > arch/arm64/kvm/hyp/nvhe/switch.c | 4 +- > 3 files changed, 48 insertions(+), 30 deletions(-) > > diff --git a/arch/arm64/include/asm/kvm_hyp.h b/arch/arm64/include/asm/kvm_hyp.h > index 52ac90d419e7..6286e580696e 100644 > --- a/arch/arm64/include/asm/kvm_hyp.h > +++ b/arch/arm64/include/asm/kvm_hyp.h > @@ -103,8 +103,10 @@ void __debug_switch_to_guest(struct kvm_vcpu *vcpu); > void __debug_switch_to_host(struct kvm_vcpu *vcpu); > > #ifdef __KVM_NVHE_HYPERVISOR__ > -void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt); > -void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt); > +void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt); > +void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt); > #endif > > void __fpsimd_save_state(struct user_fpsimd_state *fp_regs); > diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c > index f389ee59788c..6174f710948e 100644 > --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c > +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c > @@ -51,42 +51,57 @@ static void __debug_restore_spe(struct kvm_cpu_context *host_ctxt) > write_sysreg_s(ctxt_sys_reg(host_ctxt, PMSCR_EL1), SYS_PMSCR_EL1); > } > > -static void __debug_save_trace(struct kvm_cpu_context *host_ctxt) > +/* > + * Save TRFCR and disable trace completely if TRBE is being used, otherwise > + * apply required guest TRFCR value. > + */ > +static void __debug_save_trace(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt) > { > - ctxt_sys_reg(host_ctxt, TRFCR_EL1) = 0; > + ctxt_sys_reg(host_ctxt, TRFCR_EL1) = read_sysreg_s(SYS_TRFCR_EL1); > > /* Check if the TRBE is enabled */ > - if (!(read_sysreg_s(SYS_TRBLIMITR_EL1) & TRBLIMITR_EL1_E)) > - return; > - /* > - * Prohibit trace generation while we are in guest. > - * Since access to TRFCR_EL1 is trapped, the guest can't > - * modify the filtering set by the host. > - */ > - ctxt_sys_reg(host_ctxt, TRFCR_EL1) = read_sysreg_s(SYS_TRFCR_EL1); > - write_sysreg_s(0, SYS_TRFCR_EL1); > - isb(); > - /* Drain the trace buffer to memory */ > - tsb_csync(); > + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRBE) && > + (read_sysreg_s(SYS_TRBLIMITR_EL1) & TRBLIMITR_EL1_E)) { > + /* > + * Prohibit trace generation while we are in guest. Since access > + * to TRFCR_EL1 is trapped, the guest can't modify the filtering > + * set by the host. > + */ > + ctxt_sys_reg(guest_ctxt, TRFCR_EL1) = 0; > + write_sysreg_s(0, SYS_TRFCR_EL1); > + isb(); > + /* Drain the trace buffer to memory */ > + tsb_csync(); > + } else { > + /* > + * Not using TRBE, so guest trace works. Apply the guest filters > + * provided by the Coresight driver, if different. > + */ > + if (ctxt_sys_reg(host_ctxt, TRFCR_EL1) != > + ctxt_sys_reg(guest_ctxt, TRFCR_EL1)) > + write_sysreg_s(ctxt_sys_reg(guest_ctxt, TRFCR_EL1), > + SYS_TRFCR_EL1); > + } > } > > -static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt) > +static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt) > { > - if (!ctxt_sys_reg(host_ctxt, TRFCR_EL1)) > - return; > - > /* Restore trace filter controls */ > - write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); > + if (ctxt_sys_reg(host_ctxt, TRFCR_EL1) != ctxt_sys_reg(guest_ctxt, TRFCR_EL1)) > + write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); > } > > -void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt) > +void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt) > { > /* Disable and flush SPE data generation */ > if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_SPE)) > __debug_save_spe(host_ctxt); > - /* Disable and flush Self-Hosted Trace generation */ > - if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRBE)) > - __debug_save_trace(host_ctxt); > + > + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) > + __debug_save_trace(host_ctxt, guest_ctxt); > } > > void __debug_switch_to_guest(struct kvm_vcpu *vcpu) > @@ -94,12 +109,13 @@ void __debug_switch_to_guest(struct kvm_vcpu *vcpu) > __debug_switch_to_guest_common(vcpu); > } > > -void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt) > +void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > + struct kvm_cpu_context *guest_ctxt) > { > if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_SPE)) > __debug_restore_spe(host_ctxt); > - if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRBE)) > - __debug_restore_trace(host_ctxt); > + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) > + __debug_restore_trace(host_ctxt, guest_ctxt); > } > > void __debug_switch_to_host(struct kvm_vcpu *vcpu) > diff --git a/arch/arm64/kvm/hyp/nvhe/switch.c b/arch/arm64/kvm/hyp/nvhe/switch.c > index 6b4b24ae077f..c7bea5cf672d 100644 > --- a/arch/arm64/kvm/hyp/nvhe/switch.c > +++ b/arch/arm64/kvm/hyp/nvhe/switch.c > @@ -278,7 +278,7 @@ int __kvm_vcpu_run(struct kvm_vcpu *vcpu) > * translation regime to EL2 (via MDCR_EL2_E2PB == 0) and > * before we load guest Stage1. > */ > - __debug_save_host_buffers_nvhe(host_ctxt); > + __debug_save_host_buffers_nvhe(host_ctxt, guest_ctxt); > > /* > * We're about to restore some new MMU state. Make sure > @@ -345,7 +345,7 @@ int __kvm_vcpu_run(struct kvm_vcpu *vcpu) > * This must come after restoring the host sysregs, since a non-VHE > * system may enable SPE here and make use of the TTBRs. > */ > - __debug_restore_host_buffers_nvhe(host_ctxt); > + __debug_restore_host_buffers_nvhe(host_ctxt, guest_ctxt); > > if (pmu_switch_needed) > __pmu_switch_to_host(vcpu);