Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2583206ybe; Tue, 3 Sep 2019 15:23:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxLCM6o1r+3+m0pkvegoGsQGsA3trP8XYwvtFVkfeYLrR8yBjs9/cEAC/9LnZMA/2RxpMkp X-Received: by 2002:a62:d14c:: with SMTP id t12mr9362181pfl.185.1567549404105; Tue, 03 Sep 2019 15:23:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567549404; cv=none; d=google.com; s=arc-20160816; b=GHKhVQOozYzTY7+6qbJJSMB0wi6v/RhKUL5soimccdujplvCZXlyUh7pLc+Rciex1V YpsdWgCkMYp3iQuYxaMTdoyRY3M7jX38vmf1NQGbAyEDTUooYX+JjXDmu371lq+G1ruX 7QFYr5Glh5M4erVCVeCzvZiKpwivEX9n+9IIlCZr+vneZRY0EAGWfTegvm2vA+U7cMa+ U0o+BbtPc1uoUR6kA0TedOdbMIuPeJovkQpyFXKV7yv3wDP3jUzFOBbrjMAI+DttZups 4mAxIE5tjnZe9DM0np0lHDaYK07Sw/B6cqg4LMWn9tltPMavcpwS6bUOVJUcTRyjOsfg ZNBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=v4D8nB92vDCp2Gu6/DC3WBi67V3T8X58MNnsX5mRdAo=; b=fut0nGEwRXyKSWkOVT7aeJcfvzWtlRf6sp7XTEBTFTyPaSHqmA2d70lle9KUCpK/A4 nE7EbCnSdiViNDddd7QOZVPTaJq1Li+Y5PRs9Lp31x7P8KtEA5FTEfTMA4ryWqbnYtke 7iV2V4NAEIiDZg9xUoRAsMLvt/q4h1z9rUyUETRU0FOochx2QSpZ78VmPLn5LhOocCeO KVnZQdKs7zFbKE0dwKy4LO23yALvnpqD9hdcwGGZ9rq2Uszf477cm/mHlLoILe1R7BJZ +UnBJwNpcljDFL6ARbkEbAgEBoYv3P4qQYODMUieBFkmgRUOqB2a+L+LttfhhlTm2BGU n4PA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=LG3TxYvV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id br3si719278pjb.6.2019.09.03.15.23.07; Tue, 03 Sep 2019 15:23:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=LG3TxYvV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726440AbfICWWT (ORCPT + 99 others); Tue, 3 Sep 2019 18:22:19 -0400 Received: from mail-pl1-f196.google.com ([209.85.214.196]:46315 "EHLO mail-pl1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725990AbfICWWT (ORCPT ); Tue, 3 Sep 2019 18:22:19 -0400 Received: by mail-pl1-f196.google.com with SMTP id t1so313206plq.13 for ; Tue, 03 Sep 2019 15:22:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=v4D8nB92vDCp2Gu6/DC3WBi67V3T8X58MNnsX5mRdAo=; b=LG3TxYvV9qhgeMHFqVxsk5NsjUnYzE2kFjgNVnJpVkLEq0e1eLrXrf+fvBYCOY8Czx D9NkR73bqj6WPF17RfV9s1ZvaTwsYbLCFveVjSTVrR46DVplSqYN4yLEjs/Zux5PtX84 BDvsnVXWvLQzwZJTEkbQe/Fw0lses2QKJkpAj25mSENKmsbzEMR761dbPCX6D1hm4rKq 0vGr4qQLGtxcyCZU23v1jFDlKha89gcQbBZKwFKJKSIKI8E5XCIJetwjY0NSa2Ccw3mA roMaSJYg21Cjc0rEiNwBkdqeZK9c4xvG668v0iHzE9g6lXQA4QUhDiUxgGhKkertjlC8 Rbsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=v4D8nB92vDCp2Gu6/DC3WBi67V3T8X58MNnsX5mRdAo=; b=JIThO5+ptR1MO+amKIwHeB/LxRRyLld9aNxL5k2ekLBzhWurSrmV2Tci8jyYr7y0U3 RRjEeWABW0UH85FDvLA3roN0OL+7P5/D3/TnrcxBTLptlnq+7DFC4Fxu8QKou63sG0PJ Y3u1FU7w6sBXP5ShHKR12SbamuW9naRM7TYTry4V6jnctDfvOupacp1LIYAtra3TLUj0 BXhxSBz8F4DX8VLYLr4O1bPuNKVwAARsDSutjdO+J45pT63pqnJtgNUzlG6i6kSAaiPs S7XPlF6Om4QZYigqOEvpSAlHuokGI4yauyChe8vjhvSuOm7NJAU385RgpnnEi7ByUT6H TPzQ== X-Gm-Message-State: APjAAAUbYjN82mOTtQxs21u5q6ERn+tVLWlJp07k8FJarUnBGi4ECxiY obl/MyajE3EM2D04tDw/Ch/p1lpI+sA= X-Received: by 2002:a17:902:e584:: with SMTP id cl4mr36593809plb.160.1567549338531; Tue, 03 Sep 2019 15:22:18 -0700 (PDT) Received: from xps15 (S0106002369de4dac.cg.shawcable.net. [68.147.8.254]) by smtp.gmail.com with ESMTPSA id r23sm554511pjo.22.2019.09.03.15.22.17 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 03 Sep 2019 15:22:17 -0700 (PDT) Date: Tue, 3 Sep 2019 16:22:15 -0600 From: Mathieu Poirier To: Leo Yan Cc: Arnaldo Carvalho de Melo , Suzuki K Poulose , Alexander Shishkin , Jiri Olsa , Namhyung Kim , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Mike Leach , Robert Walker , Adrian Hunter Subject: Re: [PATCH v1 1/3] perf cs-etm: Refactor instruction size handling Message-ID: <20190903222215.GD25787@xps15> References: <20190830062421.31275-1-leo.yan@linaro.org> <20190830062421.31275-2-leo.yan@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190830062421.31275-2-leo.yan@linaro.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 30, 2019 at 02:24:19PM +0800, Leo Yan wrote: > There has several code pieces need to know the instruction size, but > now every place calculates the instruction size separately. > > This patch refactors to create a new function cs_etm__instr_size() as > a central place to analyze the instruction length based on ISA type > and instruction value. > > Signed-off-by: Leo Yan > --- > tools/perf/util/cs-etm.c | 44 +++++++++++++++++++++++++++------------- > 1 file changed, 30 insertions(+), 14 deletions(-) > > diff --git a/tools/perf/util/cs-etm.c b/tools/perf/util/cs-etm.c > index b3a5daaf1a8f..882a0718033d 100644 > --- a/tools/perf/util/cs-etm.c > +++ b/tools/perf/util/cs-etm.c > @@ -914,6 +914,26 @@ static inline int cs_etm__t32_instr_size(struct cs_etm_queue *etmq, > return ((instrBytes[1] & 0xF8) >= 0xE8) ? 4 : 2; > } > > +static inline int cs_etm__instr_size(struct cs_etm_queue *etmq, > + u8 trace_chan_id, > + enum cs_etm_isa isa, > + u64 addr) > +{ > + int insn_len; > + > + /* > + * T32 instruction size might be 32-bit or 16-bit, decide by calling > + * cs_etm__t32_instr_size(). > + */ > + if (isa == CS_ETM_ISA_T32) > + insn_len = cs_etm__t32_instr_size(etmq, trace_chan_id, addr); > + /* Otherwise, A64 and A32 instruction size are always 32-bit. */ > + else > + insn_len = 4; > + > + return insn_len; > +} > + > static inline u64 cs_etm__first_executed_instr(struct cs_etm_packet *packet) > { > /* Returns 0 for the CS_ETM_DISCONTINUITY packet */ > @@ -938,19 +958,23 @@ static inline u64 cs_etm__instr_addr(struct cs_etm_queue *etmq, > const struct cs_etm_packet *packet, > u64 offset) > { > + int insn_len; > + > if (packet->isa == CS_ETM_ISA_T32) { > u64 addr = packet->start_addr; > > while (offset > 0) { > - addr += cs_etm__t32_instr_size(etmq, > - trace_chan_id, addr); > + addr += cs_etm__instr_size(etmq, trace_chan_id, > + packet->isa, addr); > offset--; > } > return addr; > } > > - /* Assume a 4 byte instruction size (A32/A64) */ > - return packet->start_addr + offset * 4; > + /* Return instruction size for A32/A64 */ > + insn_len = cs_etm__instr_size(etmq, trace_chan_id, > + packet->isa, packet->start_addr); > + return packet->start_addr + offset * insn_len; This patch will work but from where I stand it makes things difficult to understand more than anything else. It is also adding coupling between function cs_etm__instr_addr() and cs_etm__instr_size(), meaning the code needs to be carefully inspected in order to make changes to either one. Last but not least function cs_etm__instr_size() isn't used in the upcoming patches. I really don't see what is gained here. Thanks, Mathieu > } > > static void cs_etm__update_last_branch_rb(struct cs_etm_queue *etmq, > @@ -1090,16 +1114,8 @@ static void cs_etm__copy_insn(struct cs_etm_queue *etmq, > return; > } > > - /* > - * T32 instruction size might be 32-bit or 16-bit, decide by calling > - * cs_etm__t32_instr_size(). > - */ > - if (packet->isa == CS_ETM_ISA_T32) > - sample->insn_len = cs_etm__t32_instr_size(etmq, trace_chan_id, > - sample->ip); > - /* Otherwise, A64 and A32 instruction size are always 32-bit. */ > - else > - sample->insn_len = 4; > + sample->insn_len = cs_etm__instr_size(etmq, trace_chan_id, > + packet->isa, sample->ip); > > cs_etm__mem_access(etmq, trace_chan_id, sample->ip, > sample->insn_len, (void *)sample->insn); > -- > 2.17.1 >