Received: by 2002:a05:7412:e79e:b0:f3:1519:9f41 with SMTP id o30csp93538rdd; Wed, 22 Nov 2023 10:11:33 -0800 (PST) X-Google-Smtp-Source: AGHT+IFpja2m3KyIypBidopN4SybQNCoh5nXBceE8E0MEU17p13V0dY+qTEoDQDX9T8LyZxLIAlA X-Received: by 2002:a05:6808:124e:b0:3b6:b071:3079 with SMTP id o14-20020a056808124e00b003b6b0713079mr4275560oiv.27.1700676692832; Wed, 22 Nov 2023 10:11:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700676692; cv=none; d=google.com; s=arc-20160816; b=LHrzZ2nTRHg1867O0d+2VJB5FnE6KoAGB+/3yvh6wckBiuqFBBnJGUdujFZHL2gLLS jNVrpwHjveE+XaxgNWUZOlgiab9GOsmz3N99TEZj0A1Dmgu/B48n2NBAn8ijLYQCHG7s uVAJeSu50ocoD7nVRPBNihGlyYqla5iHsFnYW4CQCnNIYtBTvy7iCOOmOuD/sJs4Pmbz WYyG2Et9eLt0fLggM4v+meAyppEkZ2nApNz1GlgHGdTdPgcKrSVk09u72HhJm6rIRsqL XeAOj/b/dA4dGVM9C2FLTLt9chE/x7ryocl9rV9mgBdgEEg85cmEfCIcPOocH05OKbb9 TvAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id; bh=tx/ggN6qk2FWfA+tdvcofGM2XlKzxs17X3TYyb84Pdg=; fh=X/UysCysK/lNXEMy0Z7dktkVokAGI10FbtvgxK9oPt8=; b=Q+/mZztCbELFzb20iopduoNodKqlB00EcrfnjOnBFWiyK1Wts5NwQfH5ih3HNcm+0q NrTcooPVzRzj3vJvJysGBHN0L45MHSE3cH3F3ACvWTRsJNqjmIihx3y90t+fD0X58qzC K2cK0s1AE3b/EiZc2nu44DRqoM/IF7XpLQGT/rKcZLDyJubtpZdPCTEYjdVpm471o3K7 //3HFnJhoz4sk9hGs8MpiBKP4d3eymBiJVb3E/wM/MAW4H9UX8pnkfoHCX5dV/fO447n euhbg1EB/mUhdr7ZeQNYeS9htH7/VWbEf3AW2gCEYBQgvL1zuuJ9F7fH18jWtUOy3FYC SyHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id ca23-20020a056a02069700b005be209ac7fesi14084979pgb.744.2023.11.22.10.11.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 10:11:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 80AB68096A6E; Wed, 22 Nov 2023 10:10:27 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344008AbjKVSKO (ORCPT + 99 others); Wed, 22 Nov 2023 13:10:14 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39778 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231410AbjKVSKN (ORCPT ); Wed, 22 Nov 2023 13:10:13 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 745D6A2 for ; Wed, 22 Nov 2023 10:10:07 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B9F491042; Wed, 22 Nov 2023 10:10:53 -0800 (PST) Received: from [10.57.42.32] (unknown [10.57.42.32]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1D0B83F73F; Wed, 22 Nov 2023 10:10:03 -0800 (PST) Message-ID: <02692fd9-d184-4b33-9f45-dd62593064e5@arm.com> Date: Wed, 22 Nov 2023 18:10:02 +0000 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 4/6] arm64: KVM: Add interface to set guest value for TRFCR register Content-Language: en-GB From: Suzuki K Poulose To: James Clark , coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, maz@kernel.org Cc: broonie@kernel.org, Oliver Upton , James Morse , Zenghui Yu , Catalin Marinas , Will Deacon , Mike Leach , Leo Yan , Alexander Shishkin , Anshuman Khandual , Rob Herring , Jintack Lim , Kristina Martsenko , Fuad Tabba , Akihiko Odaki , Joey Gouly , linux-kernel@vger.kernel.org References: <20231019165510.1966367-1-james.clark@arm.com> <20231019165510.1966367-5-james.clark@arm.com> <0ebe2a54-8111-4e8e-8afe-3e17ce85fcb9@arm.com> In-Reply-To: <0ebe2a54-8111-4e8e-8afe-3e17ce85fcb9@arm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Wed, 22 Nov 2023 10:10:27 -0800 (PST) On 16/11/2023 19:26, Suzuki K Poulose wrote: > On 19/10/2023 17:55, James Clark wrote: >> Add an interface for the Coresight driver to use to set the value of the >> TRFCR register for the guest. This register controls the exclude >> settings for trace at different exception levels, and is used to honor >> the exclude_host and exclude_guest parameters from the Perf session. >> This will be used to later write TRFCR_EL1 on nVHE at guest switch. For >> VHE, the host trace is controlled by TRFCR_EL2 and thus we can write to >> the TRFCR_EL1 immediately. Because guest writes to the register are >> trapped, the value will persist and can't be modified. > > This could also be added below to make it easier for the code reader. > >> >> The settings must be copied to the vCPU before each run in the same >> way that PMU events are, because the per-cpu struct isn't accessible in >> protected mode. >> >> Signed-off-by: James Clark >> --- >>   arch/arm64/include/asm/kvm_host.h |  3 +++ >>   arch/arm64/kvm/arm.c              |  1 + >>   arch/arm64/kvm/debug.c            | 26 ++++++++++++++++++++++++++ >>   3 files changed, 30 insertions(+) >> >> diff --git a/arch/arm64/include/asm/kvm_host.h >> b/arch/arm64/include/asm/kvm_host.h >> index 0f0bf8e641bd..e1852102550d 100644 >> --- a/arch/arm64/include/asm/kvm_host.h >> +++ b/arch/arm64/include/asm/kvm_host.h >> @@ -1125,6 +1125,8 @@ void kvm_arch_vcpu_put_debug_state_flags(struct >> kvm_vcpu *vcpu); >>   void kvm_set_pmu_events(u32 set, struct perf_event_attr *attr); >>   void kvm_clr_pmu_events(u32 clr); >>   bool kvm_set_pmuserenr(u64 val); >> +void kvm_etm_set_guest_trfcr(u64 trfcr_guest); >> +void kvm_etm_update_vcpu_events(struct kvm_vcpu *vcpu); >>   #else >>   static inline void kvm_set_pmu_events(u32 set, struct >> perf_event_attr *attr) {} >>   static inline void kvm_clr_pmu_events(u32 clr) {} >> @@ -1132,6 +1134,7 @@ static inline bool kvm_set_pmuserenr(u64 val) >>   { >>       return false; >>   } >> +static inline void kvm_etm_set_guest_trfcr(u64 trfcr_guest) {} >>   #endif >>   void kvm_vcpu_load_sysregs_vhe(struct kvm_vcpu *vcpu); >> diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c >> index 0f717b6a9151..e4d846f2f665 100644 >> --- a/arch/arm64/kvm/arm.c >> +++ b/arch/arm64/kvm/arm.c >> @@ -1015,6 +1015,7 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu) >>           kvm_vgic_flush_hwstate(vcpu); >>           kvm_pmu_update_vcpu_events(vcpu); >> +        kvm_etm_update_vcpu_events(vcpu); >>           /* >>            * Ensure we set mode to IN_GUEST_MODE after we disable >> diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c >> index 20cdd40b3c42..2ab41b954512 100644 >> --- a/arch/arm64/kvm/debug.c >> +++ b/arch/arm64/kvm/debug.c >> @@ -23,6 +23,12 @@ >>   static DEFINE_PER_CPU(u64, mdcr_el2); >> +/* >> + * Per CPU value for TRFCR that should be applied to any guest vcpu >> that may >> + * run on that core in the future. >> + */ >> +static DEFINE_PER_CPU(u64, guest_trfcr); >> + >>   /** >>    * save/restore_guest_debug_regs >>    * >> @@ -356,3 +362,23 @@ void kvm_arch_vcpu_put_debug_state_flags(struct >> kvm_vcpu *vcpu) >>       vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>       vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); >>   } >> + > > The comment in the description could be helpful here. > >> +void kvm_etm_set_guest_trfcr(u64 trfcr_guest) >> +{ >> +    if (has_vhe()) I am wondering if "kvm" should do the extra safety check of making sure that the FEAT_TRF is available on the CPU, before actually writing to the register ? coresight calls this only when the FEAT_TRF is implemented. But given this is an exported function, may be we should be extra careful ? Suzuki >> +        write_sysreg_s(trfcr_guest, SYS_TRFCR_EL12); >> +    else >> +        *this_cpu_ptr(&guest_trfcr) = trfcr_guest; >> +} >> +EXPORT_SYMBOL_GPL(kvm_etm_set_guest_trfcr); >> + >> +/* >> + * Updates the vcpu's view of the etm events for this cpu. Must be >> + * called before every vcpu run after disabling interrupts, to ensure >> + * that an interrupt cannot fire and update the structure. >> + */ >> +void kvm_etm_update_vcpu_events(struct kvm_vcpu *vcpu) >> +{ >> +    if (!has_vhe() && vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_TRFCR)) >> +        ctxt_sys_reg(&vcpu->arch.ctxt, TRFCR_EL1) = >> *this_cpu_ptr(&guest_trfcr); >> +} > > Either way, > > Reviewed-by: Suzuki K Poulose