Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1190095rdh; Fri, 24 Nov 2023 07:05:50 -0800 (PST) X-Google-Smtp-Source: AGHT+IG8Bn35u2txvltY6uoTOaRjZqqctIGzAUltStjJe/qMoAyhDbrSq9aPUWFFW0mk3AS+QZo8 X-Received: by 2002:a05:6870:aa96:b0:1fa:1386:cf9f with SMTP id gr22-20020a056870aa9600b001fa1386cf9fmr563510oab.31.1700838350163; Fri, 24 Nov 2023 07:05:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700838350; cv=none; d=google.com; s=arc-20160816; b=CFWRkTjG2/70P4HlLml9EAUmZonYN69hzIOVnBPTQ7onM/irdBZLYP5MOtiZiQFeJ9 chUXNNRPUzK0MTn6VyPILZ0ElG+L19Fry29amHmqnlZn+ReXcDJRD+iMbuHAUHWzugEE sWMwPqz5qdHU1oj6RmMVFGcVC4BkJpNFJVVN4zQkxuXMm1kgKQ46m7MfD4mNBUAkz1PZ GRww639+8pbd4ySLjY84MThvctFwxBZtRH+eKjm9zuhHpF0ZVlaS5gTOT7HznC7dU5dI Ng0xBMJy5L71rKFqOQEvZOZ2T/eK8DLc8Laick33ReL0yGRN1A2GglAPnl4MziU7AJCY nqRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=oCCdWWvLR41t9OqVmWc5maz+wW2QRA0cRlaEEZ3+DAc=; fh=Qqn+9RqQREKoc8Abhu7XILZF0Om8PPLs3PO5xUVqizo=; b=LgmoIz6maKH0Wkk3YsMrFtOQUd844AY6WK09JtnIN4wsnRBMw+QZ9SHT7FyTRY+E6f uNuZqN9WvimydvEJGnW79xGFvV0yQl+hoOktaG+rbG8sGSGzm+XZT1N5Fpr5vgCsdnar GbKaqMFNb2svjSxq2tMlvTdl1X9c1/NFTqddYll7zmaZe507k/4nsE1DopDvDkRxyoen DhkQacfpxKUgeuOySgMWEBKZUwn/NchtHd8DpyUL0qM68gEI4mACAWqwnhSvPRkVWD1l TilcVYxC9f3mObHwDhggoY8vg1hZ8efnCO5yefq03JrOidRrnNm/OsOLxl4OaVFkUSUm 66xQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id ng18-20020a056871339200b001f977e21922si1397158oac.283.2023.11.24.07.05.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 07:05:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id D67008095F51; Fri, 24 Nov 2023 07:05:31 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345649AbjKXPFQ (ORCPT + 99 others); Fri, 24 Nov 2023 10:05:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36112 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345763AbjKXPE6 (ORCPT ); Fri, 24 Nov 2023 10:04:58 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4B2381FD5 for ; Fri, 24 Nov 2023 07:05:01 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6D67D1063; Fri, 24 Nov 2023 07:05:47 -0800 (PST) Received: from [10.57.5.4] (unknown [10.57.5.4]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AB33C3F73F; Fri, 24 Nov 2023 07:04:57 -0800 (PST) Message-ID: Date: Fri, 24 Nov 2023 15:04:56 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1 Subject: Re: [PATCH v3 4/6] arm64: KVM: Add interface to set guest value for TRFCR register Content-Language: en-US To: Suzuki K Poulose Cc: broonie@kernel.org, Oliver Upton , James Morse , Zenghui Yu , Catalin Marinas , Will Deacon , Mike Leach , Leo Yan , Alexander Shishkin , Anshuman Khandual , Rob Herring , Jintack Lim , Kristina Martsenko , Fuad Tabba , Akihiko Odaki , Joey Gouly , linux-kernel@vger.kernel.org, coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, maz@kernel.org References: <20231019165510.1966367-1-james.clark@arm.com> <20231019165510.1966367-5-james.clark@arm.com> <0ebe2a54-8111-4e8e-8afe-3e17ce85fcb9@arm.com> From: James Clark In-Reply-To: <0ebe2a54-8111-4e8e-8afe-3e17ce85fcb9@arm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.4 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Fri, 24 Nov 2023 07:05:32 -0800 (PST) On 16/11/2023 19:26, Suzuki K Poulose wrote: > On 19/10/2023 17:55, James Clark wrote: >> Add an interface for the Coresight driver to use to set the value of the >> TRFCR register for the guest. This register controls the exclude >> settings for trace at different exception levels, and is used to honor >> the exclude_host and exclude_guest parameters from the Perf session. >> This will be used to later write TRFCR_EL1 on nVHE at guest switch. For >> VHE, the host trace is controlled by TRFCR_EL2 and thus we can write to >> the TRFCR_EL1 immediately. Because guest writes to the register are >> trapped, the value will persist and can't be modified. > > This could also be added below to make it easier for the code reader. > >> >> The settings must be copied to the vCPU before each run in the same >> way that PMU events are, because the per-cpu struct isn't accessible in >> protected mode. >> >> Signed-off-by: James Clark >> --- >>   arch/arm64/include/asm/kvm_host.h |  3 +++ >>   arch/arm64/kvm/arm.c              |  1 + >>   arch/arm64/kvm/debug.c            | 26 ++++++++++++++++++++++++++ >>   3 files changed, 30 insertions(+) >> >> diff --git a/arch/arm64/include/asm/kvm_host.h >> b/arch/arm64/include/asm/kvm_host.h >> index 0f0bf8e641bd..e1852102550d 100644 >> --- a/arch/arm64/include/asm/kvm_host.h >> +++ b/arch/arm64/include/asm/kvm_host.h >> @@ -1125,6 +1125,8 @@ void kvm_arch_vcpu_put_debug_state_flags(struct >> kvm_vcpu *vcpu); >>   void kvm_set_pmu_events(u32 set, struct perf_event_attr *attr); >>   void kvm_clr_pmu_events(u32 clr); >>   bool kvm_set_pmuserenr(u64 val); >> +void kvm_etm_set_guest_trfcr(u64 trfcr_guest); >> +void kvm_etm_update_vcpu_events(struct kvm_vcpu *vcpu); >>   #else >>   static inline void kvm_set_pmu_events(u32 set, struct >> perf_event_attr *attr) {} >>   static inline void kvm_clr_pmu_events(u32 clr) {} >> @@ -1132,6 +1134,7 @@ static inline bool kvm_set_pmuserenr(u64 val) >>   { >>       return false; >>   } >> +static inline void kvm_etm_set_guest_trfcr(u64 trfcr_guest) {} >>   #endif >>     void kvm_vcpu_load_sysregs_vhe(struct kvm_vcpu *vcpu); >> diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c >> index 0f717b6a9151..e4d846f2f665 100644 >> --- a/arch/arm64/kvm/arm.c >> +++ b/arch/arm64/kvm/arm.c >> @@ -1015,6 +1015,7 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu) >>           kvm_vgic_flush_hwstate(vcpu); >>             kvm_pmu_update_vcpu_events(vcpu); >> +        kvm_etm_update_vcpu_events(vcpu); >>             /* >>            * Ensure we set mode to IN_GUEST_MODE after we disable >> diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c >> index 20cdd40b3c42..2ab41b954512 100644 >> --- a/arch/arm64/kvm/debug.c >> +++ b/arch/arm64/kvm/debug.c >> @@ -23,6 +23,12 @@ >>     static DEFINE_PER_CPU(u64, mdcr_el2); >>   +/* >> + * Per CPU value for TRFCR that should be applied to any guest vcpu >> that may >> + * run on that core in the future. >> + */ >> +static DEFINE_PER_CPU(u64, guest_trfcr); >> + >>   /** >>    * save/restore_guest_debug_regs >>    * >> @@ -356,3 +362,23 @@ void kvm_arch_vcpu_put_debug_state_flags(struct >> kvm_vcpu *vcpu) >>       vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>       vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); >>   } >> + > > The comment in the description could be helpful here. > Yep I agree, I'll add it. >> +void kvm_etm_set_guest_trfcr(u64 trfcr_guest) >> +{ >> +    if (has_vhe()) >> +        write_sysreg_s(trfcr_guest, SYS_TRFCR_EL12); >> +    else >> +        *this_cpu_ptr(&guest_trfcr) = trfcr_guest; >> +} >> +EXPORT_SYMBOL_GPL(kvm_etm_set_guest_trfcr); >> + >> +/* >> + * Updates the vcpu's view of the etm events for this cpu. Must be >> + * called before every vcpu run after disabling interrupts, to ensure >> + * that an interrupt cannot fire and update the structure. >> + */ >> +void kvm_etm_update_vcpu_events(struct kvm_vcpu *vcpu) >> +{ >> +    if (!has_vhe() && vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_TRFCR)) >> +        ctxt_sys_reg(&vcpu->arch.ctxt, TRFCR_EL1) = >> *this_cpu_ptr(&guest_trfcr); >> +} > > Either way, > > Reviewed-by: Suzuki K Poulose >