Received: by 2002:a05:7412:5112:b0:fa:6e18:a558 with SMTP id fm18csp1648080rdb; Thu, 25 Jan 2024 01:51:26 -0800 (PST) X-Google-Smtp-Source: AGHT+IEIC6uEbzbkqqbPLotrPrWgMihv9eWs+jWHVZY2stBKl+U9pBDeIjuOt16OBP5GUzAi0ByO X-Received: by 2002:a17:90a:9b84:b0:290:bb4:531f with SMTP id g4-20020a17090a9b8400b002900bb4531fmr460479pjp.62.1706176286157; Thu, 25 Jan 2024 01:51:26 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706176286; cv=pass; d=google.com; s=arc-20160816; b=tFYiW/V+Q37g7f3kvoVxOeYRYJH7gN8vH9WbJ9wNoM0CiDS9u7/RsgS+olaPYjOFq1 Y2k9UFGafVS1YC4HFgFwM7dxQJEWC9d9xueZdU06a12XbDZYXXe/I0MI3Of3XLhKys5a E48ZuBxIm5A6AhUB8jNvoU58FUA7DamLiteloraQayeu94Z20xJUy/tEWrJ3h9kjQHME 3Pug1Nt4/9MpFDa6VG4HQWgPjgpS+GA73wexEMDVFzzQN+LWHdkabluR3RwuEaT/oKIa YZg+rh6K7/FIwnWK3J4+lRnUnL2zTx2c1OFZMi//Q31+4u5mJeiJp5aKMdvxtXXSjN42 8yLw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=JkgN/1pqIkoQ6zPCecV05wo7kFNnMLilu8zpT0cxrCA=; fh=tX4bBUVD6qRf+jYg9wx6voY3XhgD8ScCRTUpnhJCqAc=; b=h5/KKsDlZ1o4XRQHgUBWS0PouD5+uTdbgjS9qosq4A1RR2rfg8xveRyp75l1zH580y n0jLjshp4TtBKaNG/t7y+/v2jKGAH3jsnGRTz8+PVWD7HWomXHnY7Xyq6BVv+1FAhi7Y wVK2DbtE4RbBxWD7M+7FXBSVLVGzEoCsF1dACPnNt9j4TtC3/FmnMbqBCpoZ3D7g1zDh /eSpgZpAQlIK2jDU+l/0bzcpZbWg2KutkcfHoZu9CbHT4e8dpRjACgMAuMq0PLl3HxxS +ZcMOea+PxIixDiG3tt5lbz9cCiZgJA95pDm1srmUsyEqDIZb12Pb0vbcKvE9SzmEwE2 PSpQ== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-38305-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38305-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id mr21-20020a17090b239500b002903e32edb8si1043911pjb.171.2024.01.25.01.51.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Jan 2024 01:51:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-38305-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-38305-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38305-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 21BF7295231 for ; Thu, 25 Jan 2024 09:43:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8EA7A1CD3A; Thu, 25 Jan 2024 09:42:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8D5C11BF2F; Thu, 25 Jan 2024 09:42:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706175727; cv=none; b=P71CQwcDLbEiR8aWskOV9KMLj3gThMJOd8XgLdbXPVkxAxq9OeGYKivz1GyOR+Tg1l3/dUls8WXPLDsXfnTWqpAcRr7cNIfTlgUYBnypEBZLGzQ/wIki2zXhJCWyTrlAGB0/mndGPLXecXgvZkfxkfBXN/dK/XUAbCGaKu/GXFM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706175727; c=relaxed/simple; bh=kHyYYCdBgYQk24bzTT7RfjZBbzTiO+dJI+C6Eodq4+A=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=GIy65lguGBhcCJkwCRTIvZSyqOep68ZhqmbbwKHxFOxcRZ/FWNDs0s/enRLmrWPP5S6IogfMBO3laWDDFAKFjnnW9x0tw3q0pM3Frz1J65kus9L3MIHTaKeCvAoX3SMZ+irPKNgAjkjEQ2i9sEEELKYlbCMSEFT2h41Bb+kRga4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9C2CC1515; Thu, 25 Jan 2024 01:42:48 -0800 (PST) Received: from a077893.arm.com (unknown [10.163.40.116]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 9BFE23F73F; Thu, 25 Jan 2024 01:41:58 -0800 (PST) From: Anshuman Khandual To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com, mark.rutland@arm.com Cc: Anshuman Khandual , Mark Brown , James Clark , Rob Herring , Marc Zyngier , Suzuki Poulose , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , linux-perf-users@vger.kernel.org, Oliver Upton , James Morse , kvmarm@lists.linux.dev Subject: [PATCH V16 5/8] KVM: arm64: nvhe: Disable branch generation in nVHE guests Date: Thu, 25 Jan 2024 15:11:16 +0530 Message-Id: <20240125094119.2542332-6-anshuman.khandual@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240125094119.2542332-1-anshuman.khandual@arm.com> References: <20240125094119.2542332-1-anshuman.khandual@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Disable the BRBE before we enter the guest, saving the status and enable it back once we get out of the guest. This avoids capturing branch records in the guest kernel or userspace, which would be confusing the host samples. Cc: Marc Zyngier Cc: Oliver Upton Cc: James Morse Cc: Suzuki K Poulose Cc: Catalin Marinas Cc: Will Deacon Cc: kvmarm@lists.linux.dev Cc: linux-arm-kernel@lists.infradead.org CC: linux-kernel@vger.kernel.org Signed-off-by: Anshuman Khandual --- Changes in V16: - Dropped BRBCR_EL1 and BRBFCR_EL1 from enum vcpu_sysreg - Reverted back the KVM NVHE patch - used host_debug_state based 'brbcr_el1' element, and dropped the previous dependency on Jame's coresight series arch/arm64/include/asm/kvm_host.h | 5 ++++- arch/arm64/kvm/debug.c | 5 +++++ arch/arm64/kvm/hyp/nvhe/debug-sr.c | 33 ++++++++++++++++++++++++++++++ 3 files changed, 42 insertions(+), 1 deletion(-) diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h index 21c57b812569..bce8792092af 100644 --- a/arch/arm64/include/asm/kvm_host.h +++ b/arch/arm64/include/asm/kvm_host.h @@ -569,7 +569,7 @@ struct kvm_vcpu_arch { u8 cflags; /* Input flags to the hypervisor code, potentially cleared after use */ - u8 iflags; + u16 iflags; /* State flags for kernel bookkeeping, unused by the hypervisor code */ u8 sflags; @@ -610,6 +610,7 @@ struct kvm_vcpu_arch { u64 pmscr_el1; /* Self-hosted trace */ u64 trfcr_el1; + u64 brbcr_el1; } host_debug_state; /* VGIC state */ @@ -779,6 +780,8 @@ struct kvm_vcpu_arch { #define DEBUG_STATE_SAVE_TRBE __vcpu_single_flag(iflags, BIT(6)) /* vcpu running in HYP context */ #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) +/* Save BRBE context if active */ +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(8)) /* SVE enabled for host EL0 */ #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c index 8725291cb00a..99f85d8acbf3 100644 --- a/arch/arm64/kvm/debug.c +++ b/arch/arm64/kvm/debug.c @@ -335,10 +335,15 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_TraceBuffer_SHIFT) && !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); + + /* Check if we have BRBE implemented and available at the host */ + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT)) + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); } void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) { vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); } diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c index 4558c02eb352..79bcf0fb1326 100644 --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c @@ -79,6 +79,34 @@ static void __debug_restore_trace(u64 trfcr_el1) write_sysreg_s(trfcr_el1, SYS_TRFCR_EL1); } +static void __debug_save_brbe(u64 *brbcr_el1) +{ + *brbcr_el1 = 0; + + /* Check if the BRBE is enabled */ + if (!(read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) + return; + + /* + * Prohibit branch record generation while we are in guest. + * Since access to BRBCR_EL1 is trapped, the guest can't + * modify the filtering set by the host. + */ + *brbcr_el1 = read_sysreg_s(SYS_BRBCR_EL1); + write_sysreg_s(0, SYS_BRBCR_EL1); + isb(); +} + +static void __debug_restore_brbe(u64 brbcr_el1) +{ + if (!brbcr_el1) + return; + + /* Restore BRBE controls */ + write_sysreg_s(brbcr_el1, SYS_BRBCR_EL1); + isb(); +} + void __debug_save_host_buffers_nvhe(struct kvm_vcpu *vcpu) { /* Disable and flush SPE data generation */ @@ -87,6 +115,9 @@ void __debug_save_host_buffers_nvhe(struct kvm_vcpu *vcpu) /* Disable and flush Self-Hosted Trace generation */ if (vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_TRBE)) __debug_save_trace(&vcpu->arch.host_debug_state.trfcr_el1); + /* Disable BRBE branch records */ + if (vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_BRBE)) + __debug_save_brbe(&vcpu->arch.host_debug_state.brbcr_el1); } void __debug_switch_to_guest(struct kvm_vcpu *vcpu) @@ -100,6 +131,8 @@ void __debug_restore_host_buffers_nvhe(struct kvm_vcpu *vcpu) __debug_restore_spe(vcpu->arch.host_debug_state.pmscr_el1); if (vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_TRBE)) __debug_restore_trace(vcpu->arch.host_debug_state.trfcr_el1); + if (vcpu_get_flag(vcpu, DEBUG_STATE_SAVE_BRBE)) + __debug_restore_brbe(vcpu->arch.host_debug_state.brbcr_el1); } void __debug_switch_to_host(struct kvm_vcpu *vcpu) -- 2.25.1