[PATCH v1 2/3] lib: sbi: Disable interrupt during config matching
Atish Patra
atishp at atishpatra.org
Sun Jan 9 17:19:10 PST 2022
On Sat, Jan 8, 2022 at 12:24 AM Nikita Shubin <nikita.shubin at maquefel.me> wrote:
>
> Hello Atish!
>
> On Fri, 7 Jan 2022 10:54:08 -0800
> Atish Patra <atishp at rivosinc.com> wrote:
>
> > PMU overflow interrupt should be disabled durinig initial
> > configuration of counters. They should be enabled while starting
> > counters.
> >
> > Fixes: 730f01bb41a6 ("lib: sbi: Support sscofpmf extension in
> > OpenSBI")
> >
> > Signed-off-by: Atish Patra <atishp at rivosinc.com>
> > ---
> > include/sbi/riscv_encoding.h | 3 ++-
> > lib/sbi/sbi_pmu.c | 10 +++++++---
> > 2 files changed, 9 insertions(+), 4 deletions(-)
> >
> > diff --git a/include/sbi/riscv_encoding.h
> > b/include/sbi/riscv_encoding.h index 8a29f8e05c9a..ac8590d72e4f 100644
> > --- a/include/sbi/riscv_encoding.h
> > +++ b/include/sbi/riscv_encoding.h
> > @@ -181,13 +181,14 @@
> > #define MHPMEVENT_VSINH (_UL(1) << 59)
> > #define MHPMEVENT_VUINH (_UL(1) << 58)
> > #else
> > -#define MHPMEVENTH_OF (_UL(1) << 31)
> > +#define MHPMEVENTH_OF (_ULL(1) << 31)
> > #define MHPMEVENTH_MINH (_ULL(1) << 30)
> > #define MHPMEVENTH_SINH (_ULL(1) << 29)
> > #define MHPMEVENTH_UINH (_ULL(1) << 28)
> > #define MHPMEVENTH_VSINH (_ULL(1) << 27)
> > #define MHPMEVENTH_VUINH (_ULL(1) << 26)
> >
> > +#define MHPMEVENT_OF (MHPMEVENTH_OF << 32)
> > #define MHPMEVENT_MINH (MHPMEVENTH_MINH << 32)
> > #define MHPMEVENT_SINH (MHPMEVENTH_SINH << 32)
> > #define MHPMEVENT_UINH (MHPMEVENTH_UINH << 32)
> > diff --git a/lib/sbi/sbi_pmu.c b/lib/sbi/sbi_pmu.c
> > index 376afec13491..a209c8e266d6 100644
> > --- a/lib/sbi/sbi_pmu.c
> > +++ b/lib/sbi/sbi_pmu.c
> > @@ -256,7 +256,7 @@ static int pmu_ctr_enable_irq_hw(int ctr_idx)
> >
> > #if __riscv_xlen == 32
> > mhpmevent_csr = CSR_MHPMEVENT3H + ctr_idx - 3;
> > - of_mask = ~MHPMEVENTH_OF;
> > + of_mask = (uint32_t)~MHPMEVENTH_OF;
> > #else
> > mhpmevent_csr = CSR_MHPMEVENT3 + ctr_idx - 3;
> > of_mask = ~MHPMEVENT_OF;
> > @@ -470,9 +470,13 @@ static int pmu_update_hw_mhpmevent(struct
> > sbi_pmu_hw_event *hw_evt, int ctr_idx, if (!mhpmevent_val || ctr_idx
> > < 3 || ctr_idx >= SBI_PMU_HW_CTR_MAX) return SBI_EFAIL;
> >
> > - /* Always clear the OVF bit and inhibit countin of events in
> > M-mode */
> > + /**
> > + * Always set the OVF bit(disable interrupts) and inhibit
> > counting of
> > + * events in M-mode. The OVF bit should be enabled during
> > the start call.
> > + */
> > if (sbi_hart_has_feature(scratch, SBI_HART_HAS_SSCOFPMF))
> > - mhpmevent_val = (mhpmevent_val &
> > ~MHPMEVENT_SSCOF_MASK) | MHPMEVENT_MINH;
> > + mhpmevent_val = (mhpmevent_val &
> > ~MHPMEVENT_SSCOF_MASK) |
> > + MHPMEVENT_MINH | MHPMEVENT_OF;
>
> Is there some strong reason to inhibit M-Mode counting here or it is
> just a workaround until mode filtering support will come up ?
>
As a security reason, any perf analysis shouldn't allow inspecting the M-mode
for hardware counters.
Privilege mode filtering is already supported in Qemu. You can set
exclude user/kernel
from perf command line for Qemu specific events (dTLB-load-misses,
dTLB-store-misses, iTLB-load-misses)
> >
> > /* Update the inhibit flags based on inhibit flags received
> > from supervisor */ pmu_update_inhibit_flags(flags, &mhpmevent_val);
>
>
> --
> opensbi mailing list
> opensbi at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/opensbi
--
Regards,
Atish
More information about the opensbi
mailing list