On Thu, Nov 15, 2018 at 02:00:39PM +0000, Julien Thierry wrote: > Hi Andrew, > > On 15/11/18 12:55, Andrew Murray wrote: > > Enable/disable event counters as appropriate when entering and exiting > > the guest to enable support for guest or host only event counting. > > > > For both VHE and non-VHE we switch the counters between host/guest at > > EL2. EL2 is filtered out by the PMU when we are using the :G modifier. > > > > Signed-off-by: Andrew Murray <andrew.murray@xxxxxxx> > > --- > > arch/arm64/kvm/hyp/switch.c | 38 ++++++++++++++++++++++++++++++++++++++ > > 1 file changed, 38 insertions(+) > > > > diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c > > index d496ef5..ebf0aac 100644 > > --- a/arch/arm64/kvm/hyp/switch.c > > +++ b/arch/arm64/kvm/hyp/switch.c > > @@ -373,6 +373,32 @@ static bool __hyp_text __hyp_switch_fpsimd(struct kvm_vcpu *vcpu) > > return true; > > } > > +static bool __hyp_text __pmu_switch_to_guest(struct kvm_cpu_context *host_ctxt) > > +{ > > + u32 host_only = host_ctxt->events_host_only; > > + u32 guest_only = host_ctxt->events_guest_only; > > + > > + if (host_only) > > + write_sysreg(host_only, pmcntenclr_el0); > > + > > + if (guest_only) > > + write_sysreg(guest_only, pmcntenset_el0); > > + > > + return (host_only || guest_only); > > +} > > + > > +static void __hyp_text __pmu_switch_to_host(struct kvm_cpu_context *host_ctxt) > > +{ > > + u32 host_only = host_ctxt->events_host_only; > > + u32 guest_only = host_ctxt->events_guest_only; > > + > > + if (guest_only) > > + write_sysreg(guest_only, pmcntenclr_el0); > > + > > + if (host_only) > > + write_sysreg(host_only, pmcntenset_el0); > > In the perf_event code, there is an ISB after enabling an event. I guess we > don't need it when setting the guest events since I believe the eret to the > guess give us the context synchronization. But don't we need one here when > restoring host only events? It's not really clear to me why the isb is present in the existing code, this was only recently introduced when adding the chained events support. Ideally for chained events you'd want to start the overflow counter first (idx) followed by the low counter second (idx-1) as to not miss overflows so an isb inbetween may be helpful. Though the isb is after both enables, this sets a clear line of where event counting starts - but ideally this would be symmetrical with an isb after the disable. At present chained counters aren't supported in the guest but in any case we turn them all on/off atomically rather than individually. I guess we get a trivial gain in accuracy by adding ISB's at some performance cost - I'm not sure I see the benefit - unless I'm missing something? Thanks, Andrew Murray > > Thanks, > > -- > Julien Thierry _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm