Message ID | 20231114051329.327572-6-anshuman.khandual@arm.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b909:0:b0:403:3b70:6f57 with SMTP id t9csp1655820vqg; Mon, 13 Nov 2023 21:14:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IFxAJixotNxaDB+DxLAQCeZnmkx8nJUHdKvfeAAXuBnQlzNQbRGcDFp+f2jZ0fWi4JvvF/k X-Received: by 2002:aca:231a:0:b0:3ae:1358:fafc with SMTP id e26-20020aca231a000000b003ae1358fafcmr9337623oie.58.1699938880659; Mon, 13 Nov 2023 21:14:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699938880; cv=none; d=google.com; s=arc-20160816; b=GaMhUlAZBE7nNbKmPwXMilCOMGF5VuHYxwKwZPhqAPFfgg7lf2sxY2aZKP1mOTz0ru 6W4weh6nVWTbNOFaCCUFEwTjNocF38qCDafl5KDtlVMtlT6WvXZjTYn0UMxf2vrZDHBq Ufk+Kx/5bDZ9AlPl2Y0IQcpmLdSA93AGo+XazTDf43UIH65BbzPn7cPuIsTcRsGiVvkN Ju9Nc+s8JmrCUTNaDjVVu3rYhnxthcOjbMor/5dptWeMMjiYQcDjdKpMdWbnPYwy/AaG /kYHc/b/vqMhnB+fNmrff96k1e9LkX5TcMvOjwWPCNPXNRUOGJey8ZVKCwrAOi8P6nvS aMRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=FexdYxBn4oggGhLoJFb1kdWRRz8NiASb6Kf7yMZvFO4=; fh=tX4bBUVD6qRf+jYg9wx6voY3XhgD8ScCRTUpnhJCqAc=; b=qOTRcWRkpsuNpSul60ojNRK8XKP06hZ/SdronmjllVFOPKzJS0e4w+t87j/alXja8N xCOCdRm3UFJnUARfE0+h+AigQ73De35qvkf/FGNAdqdLdPTZ0ZT65HVgMM1y31vbPKuE 9aJZtX8TRwkZNFEXzzPcqoU8x5GKyzqKlOrit/E8iuBl+N1e9zL+5ZGQPT/USdGoKrXV 0vdmDyrDG7nLiE1ERV1xAK4t5jlYl1MM1Op/x9/JoFeRLzb/oGAM/QduFAGFnqRCUwN9 jctPorC780WmqNaOEX2XsQ1B4US2wy1OqVKYAFV7lSnI/O/DzDtjX/W94rfKv3Ofhqdt 21NA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id c131-20020a633589000000b005bdbf2ac2d2si7079198pga.85.2023.11.13.21.14.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Nov 2023 21:14:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id B94C980212AD; Mon, 13 Nov 2023 21:14:39 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232213AbjKNFO3 (ORCPT <rfc822;lhua1029@gmail.com> + 30 others); Tue, 14 Nov 2023 00:14:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54504 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232138AbjKNFO0 (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 14 Nov 2023 00:14:26 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8C17A173C; Mon, 13 Nov 2023 21:14:16 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 96F5B1576; Mon, 13 Nov 2023 21:15:01 -0800 (PST) Received: from a077893.blr.arm.com (a077893.blr.arm.com [10.162.41.8]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 855D93F7B4; Mon, 13 Nov 2023 21:14:10 -0800 (PST) From: Anshuman Khandual <anshuman.khandual@arm.com> To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com, mark.rutland@arm.com Cc: Anshuman Khandual <anshuman.khandual@arm.com>, Mark Brown <broonie@kernel.org>, James Clark <james.clark@arm.com>, Rob Herring <robh@kernel.org>, Marc Zyngier <maz@kernel.org>, Suzuki Poulose <suzuki.poulose@arm.com>, Peter Zijlstra <peterz@infradead.org>, Ingo Molnar <mingo@redhat.com>, Arnaldo Carvalho de Melo <acme@kernel.org>, linux-perf-users@vger.kernel.org, Oliver Upton <oliver.upton@linux.dev>, James Morse <james.morse@arm.com>, kvmarm@lists.linux.dev Subject: [V14 5/8] KVM: arm64: nvhe: Disable branch generation in nVHE guests Date: Tue, 14 Nov 2023 10:43:26 +0530 Message-Id: <20231114051329.327572-6-anshuman.khandual@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231114051329.327572-1-anshuman.khandual@arm.com> References: <20231114051329.327572-1-anshuman.khandual@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 13 Nov 2023 21:14:39 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1782515111727958121 X-GMAIL-MSGID: 1782515111727958121 |
Series |
arm64/perf: Enable branch stack sampling
|
|
Commit Message
Anshuman Khandual
Nov. 14, 2023, 5:13 a.m. UTC
Disable the BRBE before we enter the guest, saving the status and enable it
back once we get out of the guest. This is just to avoid capturing records
in the guest kernel/userspace, which would be confusing the samples.
Cc: Marc Zyngier <maz@kernel.org>
Cc: Oliver Upton <oliver.upton@linux.dev>
Cc: James Morse <james.morse@arm.com>
Cc: Suzuki K Poulose <suzuki.poulose@arm.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: kvmarm@lists.linux.dev
Cc: linux-arm-kernel@lists.infradead.org
CC: linux-kernel@vger.kernel.org
Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
Changes in V14:
- This is a new patch in the series
arch/arm64/include/asm/kvm_host.h | 4 ++++
arch/arm64/kvm/debug.c | 6 +++++
arch/arm64/kvm/hyp/nvhe/debug-sr.c | 38 ++++++++++++++++++++++++++++++
3 files changed, 48 insertions(+)
Comments
On 14/11/2023 05:13, Anshuman Khandual wrote: > Disable the BRBE before we enter the guest, saving the status and enable it > back once we get out of the guest. This is just to avoid capturing records > in the guest kernel/userspace, which would be confusing the samples. > > Cc: Marc Zyngier <maz@kernel.org> > Cc: Oliver Upton <oliver.upton@linux.dev> > Cc: James Morse <james.morse@arm.com> > Cc: Suzuki K Poulose <suzuki.poulose@arm.com> > Cc: Catalin Marinas <catalin.marinas@arm.com> > Cc: Will Deacon <will@kernel.org> > Cc: kvmarm@lists.linux.dev > Cc: linux-arm-kernel@lists.infradead.org > CC: linux-kernel@vger.kernel.org > Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com> > --- > Changes in V14: > > - This is a new patch in the series > > arch/arm64/include/asm/kvm_host.h | 4 ++++ > arch/arm64/kvm/debug.c | 6 +++++ > arch/arm64/kvm/hyp/nvhe/debug-sr.c | 38 ++++++++++++++++++++++++++++++ > 3 files changed, 48 insertions(+) > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index 68421c74283a..1faa0430d8dd 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -449,6 +449,8 @@ enum vcpu_sysreg { > CNTHV_CVAL_EL2, > PMSCR_EL1, /* Statistical profiling extension */ > TRFCR_EL1, /* Self-hosted trace filters */ > + BRBCR_EL1, /* Branch Record Buffer Control Register */ > + BRBFCR_EL1, /* Branch Record Buffer Function Control Register */ > > NR_SYS_REGS /* Nothing after this line! */ > }; > @@ -753,6 +755,8 @@ struct kvm_vcpu_arch { > #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) > /* Save trace filter controls */ > #define DEBUG_STATE_SAVE_TRFCR __vcpu_single_flag(iflags, BIT(8)) > +/* Save BRBE context if active */ > +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(9)) > > /* SVE enabled for host EL0 */ > #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) > diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c > index 2ab41b954512..4055783c3d34 100644 > --- a/arch/arm64/kvm/debug.c > +++ b/arch/arm64/kvm/debug.c > @@ -354,6 +354,11 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) > !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) > vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); > } > + > + /* Check if we have BRBE implemented and available at the host */ > + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT) && > + (read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) > + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); Isn't this supposed to just be the feature check? Whether BRBE is enabled or not is checked later in __debug_save_brbe() anyway. It seems like it's possible to become enabled after this flag load part. > } > > void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) > @@ -361,6 +366,7 @@ void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) > vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); > vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); > vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); > + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); > } > > void kvm_etm_set_guest_trfcr(u64 trfcr_guest) > diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c > index 6174f710948e..e44a1f71a0f8 100644 > --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c > +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c > @@ -93,6 +93,38 @@ static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, > write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); > } > > +static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) > +{ > + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = 0; > + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = 0; > + > + /* Check if the BRBE is enabled */ > + if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) > + return; Doesn't this always fail, the host BRBCR_EL1 value was just cleared on the line above. Also, you need to read the register to determine if it was enabled or not, so you might as well always store the real value, rather than 0 in the not enabled case. > + > + /* > + * Prohibit branch record generation while we are in guest. > + * Since access to BRBCR_EL1 and BRBFCR_EL1 is trapped, the > + * guest can't modify the filtering set by the host. > + */ > + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); > + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = read_sysreg_s(SYS_BRBFCR_EL1) > + write_sysreg_s(0, SYS_BRBCR_EL1); > + write_sysreg_s(0, SYS_BRBFCR_EL1); Why does SYS_BRBFCR_EL1 need to be saved and restored? Only BRBCR_ELx_E0BRE and BRBCR_ELx_ExBRE need to be cleared to disable BRBE. > + isb(); > +} > + > +static void __debug_restore_brbe(struct kvm_cpu_context *host_ctxt) > +{ > + if (!ctxt_sys_reg(host_ctxt, BRBCR_EL1) || !ctxt_sys_reg(host_ctxt, BRBFCR_EL1)) > + return; > + > + /* Restore BRBE controls */ > + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBCR_EL1), SYS_BRBCR_EL1); > + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBFCR_EL1), SYS_BRBFCR_EL1); > + isb(); > +} > + > void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > struct kvm_cpu_context *guest_ctxt) > { > @@ -102,6 +134,10 @@ void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > > if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) > __debug_save_trace(host_ctxt, guest_ctxt); > + > + /* Disable BRBE branch records */ > + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) > + __debug_save_brbe(host_ctxt); > } > > void __debug_switch_to_guest(struct kvm_vcpu *vcpu) > @@ -116,6 +152,8 @@ void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, > __debug_restore_spe(host_ctxt); > if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) > __debug_restore_trace(host_ctxt, guest_ctxt); > + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) > + __debug_restore_brbe(host_ctxt); > } > > void __debug_switch_to_host(struct kvm_vcpu *vcpu)
On 11/14/23 14:46, James Clark wrote: > > > On 14/11/2023 05:13, Anshuman Khandual wrote: >> Disable the BRBE before we enter the guest, saving the status and enable it >> back once we get out of the guest. This is just to avoid capturing records >> in the guest kernel/userspace, which would be confusing the samples. >> >> Cc: Marc Zyngier <maz@kernel.org> >> Cc: Oliver Upton <oliver.upton@linux.dev> >> Cc: James Morse <james.morse@arm.com> >> Cc: Suzuki K Poulose <suzuki.poulose@arm.com> >> Cc: Catalin Marinas <catalin.marinas@arm.com> >> Cc: Will Deacon <will@kernel.org> >> Cc: kvmarm@lists.linux.dev >> Cc: linux-arm-kernel@lists.infradead.org >> CC: linux-kernel@vger.kernel.org >> Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com> >> --- >> Changes in V14: >> >> - This is a new patch in the series >> >> arch/arm64/include/asm/kvm_host.h | 4 ++++ >> arch/arm64/kvm/debug.c | 6 +++++ >> arch/arm64/kvm/hyp/nvhe/debug-sr.c | 38 ++++++++++++++++++++++++++++++ >> 3 files changed, 48 insertions(+) >> >> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >> index 68421c74283a..1faa0430d8dd 100644 >> --- a/arch/arm64/include/asm/kvm_host.h >> +++ b/arch/arm64/include/asm/kvm_host.h >> @@ -449,6 +449,8 @@ enum vcpu_sysreg { >> CNTHV_CVAL_EL2, >> PMSCR_EL1, /* Statistical profiling extension */ >> TRFCR_EL1, /* Self-hosted trace filters */ >> + BRBCR_EL1, /* Branch Record Buffer Control Register */ >> + BRBFCR_EL1, /* Branch Record Buffer Function Control Register */ >> >> NR_SYS_REGS /* Nothing after this line! */ >> }; >> @@ -753,6 +755,8 @@ struct kvm_vcpu_arch { >> #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) >> /* Save trace filter controls */ >> #define DEBUG_STATE_SAVE_TRFCR __vcpu_single_flag(iflags, BIT(8)) >> +/* Save BRBE context if active */ >> +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(9)) >> >> /* SVE enabled for host EL0 */ >> #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) >> diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c >> index 2ab41b954512..4055783c3d34 100644 >> --- a/arch/arm64/kvm/debug.c >> +++ b/arch/arm64/kvm/debug.c >> @@ -354,6 +354,11 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) >> !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) >> vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >> } >> + >> + /* Check if we have BRBE implemented and available at the host */ >> + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT) && >> + (read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >> + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); > > Isn't this supposed to just be the feature check? Whether BRBE is > enabled or not is checked later in __debug_save_brbe() anyway. Okay, will make it just a feature check via ID_AA64DFR0_EL1_BRBE_SHIFT. > > It seems like it's possible to become enabled after this flag load part. Agreed. > >> } >> >> void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >> @@ -361,6 +366,7 @@ void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); >> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); >> + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); >> } >> >> void kvm_etm_set_guest_trfcr(u64 trfcr_guest) >> diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >> index 6174f710948e..e44a1f71a0f8 100644 >> --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c >> +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >> @@ -93,6 +93,38 @@ static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, >> write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); >> } >> >> +static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) >> +{ >> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = 0; >> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = 0; >> + >> + /* Check if the BRBE is enabled */ >> + if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >> + return; > > Doesn't this always fail, the host BRBCR_EL1 value was just cleared on > the line above. Agreed, this error might have slipped in while converting to ctxt_sys_reg(). > > Also, you need to read the register to determine if it was enabled or Right > not, so you might as well always store the real value, rather than 0 in > the not enabled case. But if it is not enabled - why store the real value ? > >> + >> + /* >> + * Prohibit branch record generation while we are in guest. >> + * Since access to BRBCR_EL1 and BRBFCR_EL1 is trapped, the >> + * guest can't modify the filtering set by the host. >> + */ >> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); >> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = read_sysreg_s(SYS_BRBFCR_EL1) >> + write_sysreg_s(0, SYS_BRBCR_EL1); >> + write_sysreg_s(0, SYS_BRBFCR_EL1); > > Why does SYS_BRBFCR_EL1 need to be saved and restored? Only > BRBCR_ELx_E0BRE and BRBCR_ELx_ExBRE need to be cleared to disable BRBE. Right, just thought both brbcr, and brbfcr system registers represent current BRBE state (besides branch records), in a more comprehensive manner, although none would be changed from inside the guest. > >> + isb(); >> +} >> + >> +static void __debug_restore_brbe(struct kvm_cpu_context *host_ctxt) >> +{ >> + if (!ctxt_sys_reg(host_ctxt, BRBCR_EL1) || !ctxt_sys_reg(host_ctxt, BRBFCR_EL1)) >> + return; >> + >> + /* Restore BRBE controls */ >> + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBCR_EL1), SYS_BRBCR_EL1); >> + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBFCR_EL1), SYS_BRBFCR_EL1); >> + isb(); >> +} >> + >> void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >> struct kvm_cpu_context *guest_ctxt) >> { >> @@ -102,6 +134,10 @@ void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >> >> if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) >> __debug_save_trace(host_ctxt, guest_ctxt); >> + >> + /* Disable BRBE branch records */ >> + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) >> + __debug_save_brbe(host_ctxt); >> } >> >> void __debug_switch_to_guest(struct kvm_vcpu *vcpu) >> @@ -116,6 +152,8 @@ void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >> __debug_restore_spe(host_ctxt); >> if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) >> __debug_restore_trace(host_ctxt, guest_ctxt); >> + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) >> + __debug_restore_brbe(host_ctxt); >> } >> >> void __debug_switch_to_host(struct kvm_vcpu *vcpu)
On 21/11/2023 11:12, Anshuman Khandual wrote: > > > On 11/14/23 14:46, James Clark wrote: >> >> >> On 14/11/2023 05:13, Anshuman Khandual wrote: >>> Disable the BRBE before we enter the guest, saving the status and enable it >>> back once we get out of the guest. This is just to avoid capturing records >>> in the guest kernel/userspace, which would be confusing the samples. >>> >>> Cc: Marc Zyngier <maz@kernel.org> >>> Cc: Oliver Upton <oliver.upton@linux.dev> >>> Cc: James Morse <james.morse@arm.com> >>> Cc: Suzuki K Poulose <suzuki.poulose@arm.com> >>> Cc: Catalin Marinas <catalin.marinas@arm.com> >>> Cc: Will Deacon <will@kernel.org> >>> Cc: kvmarm@lists.linux.dev >>> Cc: linux-arm-kernel@lists.infradead.org >>> CC: linux-kernel@vger.kernel.org >>> Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com> >>> --- >>> Changes in V14: >>> >>> - This is a new patch in the series >>> >>> arch/arm64/include/asm/kvm_host.h | 4 ++++ >>> arch/arm64/kvm/debug.c | 6 +++++ >>> arch/arm64/kvm/hyp/nvhe/debug-sr.c | 38 ++++++++++++++++++++++++++++++ >>> 3 files changed, 48 insertions(+) >>> >>> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >>> index 68421c74283a..1faa0430d8dd 100644 >>> --- a/arch/arm64/include/asm/kvm_host.h >>> +++ b/arch/arm64/include/asm/kvm_host.h >>> @@ -449,6 +449,8 @@ enum vcpu_sysreg { >>> CNTHV_CVAL_EL2, >>> PMSCR_EL1, /* Statistical profiling extension */ >>> TRFCR_EL1, /* Self-hosted trace filters */ >>> + BRBCR_EL1, /* Branch Record Buffer Control Register */ >>> + BRBFCR_EL1, /* Branch Record Buffer Function Control Register */ >>> >>> NR_SYS_REGS /* Nothing after this line! */ >>> }; >>> @@ -753,6 +755,8 @@ struct kvm_vcpu_arch { >>> #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) >>> /* Save trace filter controls */ >>> #define DEBUG_STATE_SAVE_TRFCR __vcpu_single_flag(iflags, BIT(8)) >>> +/* Save BRBE context if active */ >>> +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(9)) >>> >>> /* SVE enabled for host EL0 */ >>> #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) >>> diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c >>> index 2ab41b954512..4055783c3d34 100644 >>> --- a/arch/arm64/kvm/debug.c >>> +++ b/arch/arm64/kvm/debug.c >>> @@ -354,6 +354,11 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) >>> !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) >>> vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>> } >>> + >>> + /* Check if we have BRBE implemented and available at the host */ >>> + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT) && >>> + (read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >>> + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); >> >> Isn't this supposed to just be the feature check? Whether BRBE is >> enabled or not is checked later in __debug_save_brbe() anyway. > > Okay, will make it just a feature check via ID_AA64DFR0_EL1_BRBE_SHIFT. > >> >> It seems like it's possible to become enabled after this flag load part. > > Agreed. > >> >>> } >>> >>> void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >>> @@ -361,6 +366,7 @@ void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); >>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); >>> + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); >>> } >>> >>> void kvm_etm_set_guest_trfcr(u64 trfcr_guest) >>> diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>> index 6174f710948e..e44a1f71a0f8 100644 >>> --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>> +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>> @@ -93,6 +93,38 @@ static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, >>> write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); >>> } >>> >>> +static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) >>> +{ >>> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = 0; >>> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = 0; >>> + >>> + /* Check if the BRBE is enabled */ >>> + if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >>> + return; >> >> Doesn't this always fail, the host BRBCR_EL1 value was just cleared on >> the line above. > > Agreed, this error might have slipped in while converting to ctxt_sys_reg(). > >> >> Also, you need to read the register to determine if it was enabled or > > Right > >> not, so you might as well always store the real value, rather than 0 in >> the not enabled case. > > But if it is not enabled - why store the real value ? > It's fewer lines of code and it's less likely to catch someone out if it's always set to whatever the host value was. Using 0 as a special value could also be an issue because it's indistinguishable from if the register was actually set to 0. It's just more to reason about when you could reduce it to a single assignment. Also it probably would have avoided the current mistake if it was always assigned to the host value as well. >> >>> + >>> + /* >>> + * Prohibit branch record generation while we are in guest. >>> + * Since access to BRBCR_EL1 and BRBFCR_EL1 is trapped, the >>> + * guest can't modify the filtering set by the host. >>> + */ >>> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); >>> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = read_sysreg_s(SYS_BRBFCR_EL1) >>> + write_sysreg_s(0, SYS_BRBCR_EL1); >>> + write_sysreg_s(0, SYS_BRBFCR_EL1); >> >> Why does SYS_BRBFCR_EL1 need to be saved and restored? Only >> BRBCR_ELx_E0BRE and BRBCR_ELx_ExBRE need to be cleared to disable BRBE. > > Right, just thought both brbcr, and brbfcr system registers represent > current BRBE state (besides branch records), in a more comprehensive > manner, although none would be changed from inside the guest. > The comment above doesn't match up with this explanation. Having it in the code implies that it's needed. And as you say the branch records are missing anyway, so you can't even infer that it's only done to be comprehensive. It would be better to not make anyone reading it wonder why it's done and just not do it. It's only 8 bytes but it's also a waste of space. >> >>> + isb(); >>> +} >>> + >>> +static void __debug_restore_brbe(struct kvm_cpu_context *host_ctxt) >>> +{ >>> + if (!ctxt_sys_reg(host_ctxt, BRBCR_EL1) || !ctxt_sys_reg(host_ctxt, BRBFCR_EL1)) >>> + return; >>> + >>> + /* Restore BRBE controls */ >>> + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBCR_EL1), SYS_BRBCR_EL1); >>> + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBFCR_EL1), SYS_BRBFCR_EL1); >>> + isb(); >>> +} >>> + >>> void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >>> struct kvm_cpu_context *guest_ctxt) >>> { >>> @@ -102,6 +134,10 @@ void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >>> >>> if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) >>> __debug_save_trace(host_ctxt, guest_ctxt); >>> + >>> + /* Disable BRBE branch records */ >>> + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) >>> + __debug_save_brbe(host_ctxt); >>> } >>> >>> void __debug_switch_to_guest(struct kvm_vcpu *vcpu) >>> @@ -116,6 +152,8 @@ void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, >>> __debug_restore_spe(host_ctxt); >>> if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) >>> __debug_restore_trace(host_ctxt, guest_ctxt); >>> + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) >>> + __debug_restore_brbe(host_ctxt); >>> } >>> >>> void __debug_switch_to_host(struct kvm_vcpu *vcpu) >
On 11/23/23 19:24, James Clark wrote: > > > On 21/11/2023 11:12, Anshuman Khandual wrote: >> >> >> On 11/14/23 14:46, James Clark wrote: >>> >>> >>> On 14/11/2023 05:13, Anshuman Khandual wrote: >>>> Disable the BRBE before we enter the guest, saving the status and enable it >>>> back once we get out of the guest. This is just to avoid capturing records >>>> in the guest kernel/userspace, which would be confusing the samples. >>>> >>>> Cc: Marc Zyngier <maz@kernel.org> >>>> Cc: Oliver Upton <oliver.upton@linux.dev> >>>> Cc: James Morse <james.morse@arm.com> >>>> Cc: Suzuki K Poulose <suzuki.poulose@arm.com> >>>> Cc: Catalin Marinas <catalin.marinas@arm.com> >>>> Cc: Will Deacon <will@kernel.org> >>>> Cc: kvmarm@lists.linux.dev >>>> Cc: linux-arm-kernel@lists.infradead.org >>>> CC: linux-kernel@vger.kernel.org >>>> Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com> >>>> --- >>>> Changes in V14: >>>> >>>> - This is a new patch in the series >>>> >>>> arch/arm64/include/asm/kvm_host.h | 4 ++++ >>>> arch/arm64/kvm/debug.c | 6 +++++ >>>> arch/arm64/kvm/hyp/nvhe/debug-sr.c | 38 ++++++++++++++++++++++++++++++ >>>> 3 files changed, 48 insertions(+) >>>> >>>> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >>>> index 68421c74283a..1faa0430d8dd 100644 >>>> --- a/arch/arm64/include/asm/kvm_host.h >>>> +++ b/arch/arm64/include/asm/kvm_host.h >>>> @@ -449,6 +449,8 @@ enum vcpu_sysreg { >>>> CNTHV_CVAL_EL2, >>>> PMSCR_EL1, /* Statistical profiling extension */ >>>> TRFCR_EL1, /* Self-hosted trace filters */ >>>> + BRBCR_EL1, /* Branch Record Buffer Control Register */ >>>> + BRBFCR_EL1, /* Branch Record Buffer Function Control Register */ >>>> >>>> NR_SYS_REGS /* Nothing after this line! */ >>>> }; >>>> @@ -753,6 +755,8 @@ struct kvm_vcpu_arch { >>>> #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) >>>> /* Save trace filter controls */ >>>> #define DEBUG_STATE_SAVE_TRFCR __vcpu_single_flag(iflags, BIT(8)) >>>> +/* Save BRBE context if active */ >>>> +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(9)) >>>> >>>> /* SVE enabled for host EL0 */ >>>> #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) >>>> diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c >>>> index 2ab41b954512..4055783c3d34 100644 >>>> --- a/arch/arm64/kvm/debug.c >>>> +++ b/arch/arm64/kvm/debug.c >>>> @@ -354,6 +354,11 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) >>>> !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) >>>> vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>>> } >>>> + >>>> + /* Check if we have BRBE implemented and available at the host */ >>>> + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT) && >>>> + (read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >>>> + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); >>> >>> Isn't this supposed to just be the feature check? Whether BRBE is >>> enabled or not is checked later in __debug_save_brbe() anyway. >> >> Okay, will make it just a feature check via ID_AA64DFR0_EL1_BRBE_SHIFT. >> >>> >>> It seems like it's possible to become enabled after this flag load part. >> >> Agreed. >> >>> >>>> } >>>> >>>> void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >>>> @@ -361,6 +366,7 @@ void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) >>>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); >>>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); >>>> vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); >>>> + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); >>>> } >>>> >>>> void kvm_etm_set_guest_trfcr(u64 trfcr_guest) >>>> diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>>> index 6174f710948e..e44a1f71a0f8 100644 >>>> --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>>> +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c >>>> @@ -93,6 +93,38 @@ static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, >>>> write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); >>>> } >>>> >>>> +static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) >>>> +{ >>>> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = 0; >>>> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = 0; >>>> + >>>> + /* Check if the BRBE is enabled */ >>>> + if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) >>>> + return; >>> >>> Doesn't this always fail, the host BRBCR_EL1 value was just cleared on >>> the line above. >> >> Agreed, this error might have slipped in while converting to ctxt_sys_reg(). >> >>> >>> Also, you need to read the register to determine if it was enabled or >> >> Right >> >>> not, so you might as well always store the real value, rather than 0 in >>> the not enabled case. >> >> But if it is not enabled - why store the real value ? >> > > It's fewer lines of code and it's less likely to catch someone out if > it's always set to whatever the host value was. Using 0 as a special > value could also be an issue because it's indistinguishable from if the > register was actually set to 0. It's just more to reason about when you > could reduce it to a single assignment. > > Also it probably would have avoided the current mistake if it was always > assigned to the host value as well. Okay, will always save SYS_BRBCR_EL1 into ctxt_sys_reg(host_ctxt, BRBCR_EL1). > >>> >>>> + >>>> + /* >>>> + * Prohibit branch record generation while we are in guest. >>>> + * Since access to BRBCR_EL1 and BRBFCR_EL1 is trapped, the >>>> + * guest can't modify the filtering set by the host. >>>> + */ >>>> + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); >>>> + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = read_sysreg_s(SYS_BRBFCR_EL1) >>>> + write_sysreg_s(0, SYS_BRBCR_EL1); >>>> + write_sysreg_s(0, SYS_BRBFCR_EL1); >>> >>> Why does SYS_BRBFCR_EL1 need to be saved and restored? Only >>> BRBCR_ELx_E0BRE and BRBCR_ELx_ExBRE need to be cleared to disable BRBE. >> >> Right, just thought both brbcr, and brbfcr system registers represent >> current BRBE state (besides branch records), in a more comprehensive >> manner, although none would be changed from inside the guest. >> > > The comment above doesn't match up with this explanation. > > Having it in the code implies that it's needed. And as you say the > branch records are missing anyway, so you can't even infer that it's > only done to be comprehensive. > > It would be better to not make anyone reading it wonder why it's done > and just not do it. It's only 8 bytes but it's also a waste of space. Sure, will drop BRBFCR_EL1 handling in here. The changed code is something like as follows. static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) { ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); /* Check if the BRBE is enabled */ if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) return; /* * Prohibit branch record generation while we are in guest. * Since access to BRBCR_EL1 is trapped, the guest can't * modify the filtering set by the host. */ write_sysreg_s(0, SYS_BRBCR_EL1); isb(); } static void __debug_restore_brbe(struct kvm_cpu_context *host_ctxt) { if (!ctxt_sys_reg(host_ctxt, BRBCR_EL1)) return; /* Restore BRBE controls */ write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBCR_EL1), SYS_BRBCR_EL1); isb(); }
diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h index 68421c74283a..1faa0430d8dd 100644 --- a/arch/arm64/include/asm/kvm_host.h +++ b/arch/arm64/include/asm/kvm_host.h @@ -449,6 +449,8 @@ enum vcpu_sysreg { CNTHV_CVAL_EL2, PMSCR_EL1, /* Statistical profiling extension */ TRFCR_EL1, /* Self-hosted trace filters */ + BRBCR_EL1, /* Branch Record Buffer Control Register */ + BRBFCR_EL1, /* Branch Record Buffer Function Control Register */ NR_SYS_REGS /* Nothing after this line! */ }; @@ -753,6 +755,8 @@ struct kvm_vcpu_arch { #define VCPU_HYP_CONTEXT __vcpu_single_flag(iflags, BIT(7)) /* Save trace filter controls */ #define DEBUG_STATE_SAVE_TRFCR __vcpu_single_flag(iflags, BIT(8)) +/* Save BRBE context if active */ +#define DEBUG_STATE_SAVE_BRBE __vcpu_single_flag(iflags, BIT(9)) /* SVE enabled for host EL0 */ #define HOST_SVE_ENABLED __vcpu_single_flag(sflags, BIT(0)) diff --git a/arch/arm64/kvm/debug.c b/arch/arm64/kvm/debug.c index 2ab41b954512..4055783c3d34 100644 --- a/arch/arm64/kvm/debug.c +++ b/arch/arm64/kvm/debug.c @@ -354,6 +354,11 @@ void kvm_arch_vcpu_load_debug_state_flags(struct kvm_vcpu *vcpu) !(read_sysreg_s(SYS_TRBIDR_EL1) & TRBIDR_EL1_P)) vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_TRBE); } + + /* Check if we have BRBE implemented and available at the host */ + if (cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_EL1_BRBE_SHIFT) && + (read_sysreg_s(SYS_BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) + vcpu_set_flag(vcpu, DEBUG_STATE_SAVE_BRBE); } void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) @@ -361,6 +366,7 @@ void kvm_arch_vcpu_put_debug_state_flags(struct kvm_vcpu *vcpu) vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_SPE); vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRBE); vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_TRFCR); + vcpu_clear_flag(vcpu, DEBUG_STATE_SAVE_BRBE); } void kvm_etm_set_guest_trfcr(u64 trfcr_guest) diff --git a/arch/arm64/kvm/hyp/nvhe/debug-sr.c b/arch/arm64/kvm/hyp/nvhe/debug-sr.c index 6174f710948e..e44a1f71a0f8 100644 --- a/arch/arm64/kvm/hyp/nvhe/debug-sr.c +++ b/arch/arm64/kvm/hyp/nvhe/debug-sr.c @@ -93,6 +93,38 @@ static void __debug_restore_trace(struct kvm_cpu_context *host_ctxt, write_sysreg_s(ctxt_sys_reg(host_ctxt, TRFCR_EL1), SYS_TRFCR_EL1); } +static void __debug_save_brbe(struct kvm_cpu_context *host_ctxt) +{ + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = 0; + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = 0; + + /* Check if the BRBE is enabled */ + if (!(ctxt_sys_reg(host_ctxt, BRBCR_EL1) & (BRBCR_ELx_E0BRE | BRBCR_ELx_ExBRE))) + return; + + /* + * Prohibit branch record generation while we are in guest. + * Since access to BRBCR_EL1 and BRBFCR_EL1 is trapped, the + * guest can't modify the filtering set by the host. + */ + ctxt_sys_reg(host_ctxt, BRBCR_EL1) = read_sysreg_s(SYS_BRBCR_EL1); + ctxt_sys_reg(host_ctxt, BRBFCR_EL1) = read_sysreg_s(SYS_BRBFCR_EL1); + write_sysreg_s(0, SYS_BRBCR_EL1); + write_sysreg_s(0, SYS_BRBFCR_EL1); + isb(); +} + +static void __debug_restore_brbe(struct kvm_cpu_context *host_ctxt) +{ + if (!ctxt_sys_reg(host_ctxt, BRBCR_EL1) || !ctxt_sys_reg(host_ctxt, BRBFCR_EL1)) + return; + + /* Restore BRBE controls */ + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBCR_EL1), SYS_BRBCR_EL1); + write_sysreg_s(ctxt_sys_reg(host_ctxt, BRBFCR_EL1), SYS_BRBFCR_EL1); + isb(); +} + void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, struct kvm_cpu_context *guest_ctxt) { @@ -102,6 +134,10 @@ void __debug_save_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) __debug_save_trace(host_ctxt, guest_ctxt); + + /* Disable BRBE branch records */ + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) + __debug_save_brbe(host_ctxt); } void __debug_switch_to_guest(struct kvm_vcpu *vcpu) @@ -116,6 +152,8 @@ void __debug_restore_host_buffers_nvhe(struct kvm_cpu_context *host_ctxt, __debug_restore_spe(host_ctxt); if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_TRFCR)) __debug_restore_trace(host_ctxt, guest_ctxt); + if (vcpu_get_flag(host_ctxt->__hyp_running_vcpu, DEBUG_STATE_SAVE_BRBE)) + __debug_restore_brbe(host_ctxt); } void __debug_switch_to_host(struct kvm_vcpu *vcpu)