Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp250248pxk; Wed, 9 Sep 2020 04:36:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZhipg0EeDxrff5HQfaUD4fsmPWfoHogaDaMfrPDJrCVXc4WpbgbIxCJpw0qtzGHErgTzs X-Received: by 2002:a05:6402:45a:: with SMTP id p26mr3848850edw.8.1599651379088; Wed, 09 Sep 2020 04:36:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599651379; cv=none; d=google.com; s=arc-20160816; b=MJV+zLeLWLXmHEK6Sq+4Ovaga5cihmTfwYUDUgSMrJkU5+NCarvRkDHcaETD2PNaPo LJOI/b3Ir25MQ1O+TIabO4SBhNqZDWcox+F6fHD7/tw+5lIPsAm1ho8MGRQAI01MKInH Z5wElP3WbPdW0bChwhZCViNkQLQk1SqZgfNCAgfJzB9IAuGhlJJtEnj3wUfEXRpgfd50 5VImHHL0Bv8TLfJ4t9IMO03TcJGjH1VEN6srjNeKytqndjv8kixXlTqo2R+/GkGIeLnt lv8vmH+g5ZxWXvvLtdBgp+40cVaqZnHHZ/xwU6DFJBY/uTXa95Yo3r0suxHsa62sfB4Z mqHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=LtilNnLErxWStMHBinOTYCeOm310xHPWuX9as3A3mtE=; b=JBr/95XWLvZ9qWC32+Qt3S6IU26LIx4QC+E0y21ELJE/Am/2xjtk7yQGgcdbFr9lIN PgdefDS2BOz0hn+8T5oDb3GfUcAybqS/eTO9p78Vap7WrIh4yMj0bl4S3ngyohWjeJ3R hLva+pCnp5cmnm4YykryJiZgB4mc4BFDnqLSIpQ6x+8eLXIKmS8AyGYQOqsJc7HQS/DL L/g+o7lGFtDw7BlYoqEHBlFxfoNU8N9GKWWJMD2Ww3LA6ysUUeyDBf6JVZ0PB8Uc3TGn vv11fjfDvIeizO4oceFkoDhIRM8cmsgd8Bg3jcWCKFedWn2fQKpFh+ovqN/Dzx0y3tlQ 64zA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=zU61Qpz5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ox9si1285616ejb.97.2020.09.09.04.35.55; Wed, 09 Sep 2020 04:36:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=zU61Qpz5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727087AbgIILfF (ORCPT + 99 others); Wed, 9 Sep 2020 07:35:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38402 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729014AbgIILak (ORCPT ); Wed, 9 Sep 2020 07:30:40 -0400 Received: from mail-ed1-x544.google.com (mail-ed1-x544.google.com [IPv6:2a00:1450:4864:20::544]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 997FBC061799 for ; Wed, 9 Sep 2020 04:30:15 -0700 (PDT) Received: by mail-ed1-x544.google.com with SMTP id c8so2278276edv.5 for ; Wed, 09 Sep 2020 04:30:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=LtilNnLErxWStMHBinOTYCeOm310xHPWuX9as3A3mtE=; b=zU61Qpz5O3/GAzIi46fVxpPzkj7+7jdqz3YsJkenU7E5tNScab8ZUNQPoLiBwdtcdJ A6cMnNTM4KziQZOBjTByAgZau05rnh9Wze9BXQi0QLqQ+L0dMx1QIGhG4Na10Xx0L6Y6 WsRxOwCfOvWrwvOcMlcn6QdVKPofYotcE1+GuXsFfe0KlV68nC/oQjKLtaEkudC1sfhr wU0s+IKyNgZFuehK/62Tb6LyE9Orssud7lYQ6ge3npzTUXB0FNvCXV+isIYu04/C6reJ DqpQKCm05ACC5axB0q3oUC40UOTbV3CF74ST0lWFd4xmkxsWc2rhfj/C5Z/pbUxdoWwf PNtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=LtilNnLErxWStMHBinOTYCeOm310xHPWuX9as3A3mtE=; b=CeDKV0bPPcqRO4YiA9/+VzdMVeE/BpKvL/aD6kNrfne7bKW+t6bJnPsYV5Jo369kHm EsyhhLLK5XpoxTcpneLTK/k5yLQNb8Mwvt/ALSPDoWlCp47YGc10XCFol3MOT4m2Bo4N TScXCZzZ8ypMDpeHeAMamXmMYNA3iISrIELBL5MnQZnmtii7tyUqzq0VgCFTJw5fTwB1 1zFtY4RTXCPc0SvLbH+PogEqIhna7AQjO3OrJlKjjPeFr56zRZH5g/rU3m307CBiNjdT x6DTzUvWVdA3Z4Cl0h29XERQyY+U2MPCnuaplnNGKa7i7KETpYkWu/aAo8+BzI4yo8BU k/tQ== X-Gm-Message-State: AOAM531rwqfSev9swjqaAPrAg7lpjqy/doEttE2UmwYwrV0NtwO18ysU r4GZNcY5D9aF07ndKEQoyvRHC1rQf8fN64jMLEpkYQ== X-Received: by 2002:a50:84a2:: with SMTP id 31mr3714353edq.138.1599651013751; Wed, 09 Sep 2020 04:30:13 -0700 (PDT) MIME-Version: 1.0 References: <1597824397-29894-1-git-send-email-liuqi115@huawei.com> <20200827204426.GD22307@xps15> <548c973d-6964-ca5c-4c8d-fbc2386f3349@arm.com> In-Reply-To: <548c973d-6964-ca5c-4c8d-fbc2386f3349@arm.com> From: Mike Leach Date: Wed, 9 Sep 2020 12:30:02 +0100 Message-ID: Subject: Re: [RFC PATCH v2] coresight: etm4x: Modify core-commit of cpu to avoid the overflow of HiSilicon ETM To: Suzuki K Poulose Cc: Mathieu Poirier , liuqi115@huawei.com, Greg Kroah-Hartman , linux-arm-kernel , Linux Kernel Mailing List , linuxarm@huawei.com, Coresight ML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Wed, 2 Sep 2020 at 11:36, Suzuki K Poulose wrote: > > On 08/27/2020 09:44 PM, Mathieu Poirier wrote: > > Hi Liu, > > > > On Wed, Aug 19, 2020 at 04:06:37PM +0800, Qi Liu wrote: > >> When too much trace information is generated on-chip, the ETM will > >> overflow, and cause data loss. This is a common phenomenon on ETM > >> devices. > >> > >> But sometimes we do not want to lose performance trace data, so we > >> suppress the speed of instructions sent from CPU core to ETM to > >> avoid the overflow of ETM. > >> > >> Signed-off-by: Qi Liu > >> --- > >> > >> Changes since v1: > >> - ETM on HiSilicon Hip09 platform supports backpressure, so does > >> not need to modify core commit. > >> > >> drivers/hwtracing/coresight/coresight-etm4x.c | 43 +++++++++++++++++++++++++++ > >> 1 file changed, 43 insertions(+) > >> > >> diff --git a/drivers/hwtracing/coresight/coresight-etm4x.c b/drivers/hwtracing/coresight/coresight-etm4x.c > >> index 7797a57..7641f89 100644 > >> --- a/drivers/hwtracing/coresight/coresight-etm4x.c > >> +++ b/drivers/hwtracing/coresight/coresight-etm4x.c > >> @@ -43,6 +43,10 @@ MODULE_PARM_DESC(boot_enable, "Enable tracing on boot"); > >> #define PARAM_PM_SAVE_NEVER 1 /* never save any state */ > >> #define PARAM_PM_SAVE_SELF_HOSTED 2 /* save self-hosted state only */ > >> > >> +#define CORE_COMMIT_CLEAR 0x3000 > >> +#define CORE_COMMIT_SHIFT 12 > >> +#define HISI_ETM_AMBA_ID_V1 0x000b6d01 > >> + > >> static int pm_save_enable = PARAM_PM_SAVE_FIRMWARE; > >> module_param(pm_save_enable, int, 0444); > >> MODULE_PARM_DESC(pm_save_enable, > >> @@ -104,11 +108,40 @@ struct etm4_enable_arg { > >> int rc; > >> }; > >> > >> +static void etm4_cpu_actlr1_cfg(void *info) > >> +{ > >> + struct etm4_enable_arg *arg = (struct etm4_enable_arg *)info; > >> + u64 val; > >> + > >> + asm volatile("mrs %0,s3_1_c15_c2_5" : "=r"(val)); > > > The ID register (S3_1_C15_c2_5) falls into implementation defined space. > See Arm ARM DDI 0487F.a, section "D12.3.2 Reserved encodings for > IMPLEMENTATION DEFINED registers". > > So, please stop calling this "etm4_cpu_actlr1_cfg". Since, > 1) actlr1 is not an architected name for the said encoding > 2) The id register could mean something else on another CPU. > > Rather this should indicate platform/CPU specific. e.g, > > etm4_cpu_hisilicon_config_core_commit() > > > >> + val &= ~CORE_COMMIT_CLEAR; > >> + val |= arg->rc << CORE_COMMIT_SHIFT; > >> + asm volatile("msr s3_1_c15_c2_5,%0" : : "r"(val)); > >> +} > >> + > >> +static void etm4_config_core_commit(int cpu, int val) > >> +{ > >> + struct etm4_enable_arg arg = {0}; > >> + > >> + arg.rc = val; > >> + smp_call_function_single(cpu, etm4_cpu_actlr1_cfg, &arg, 1); > > > > Function etm4_enable/disable_hw() are already running on the CPU they are > > supposed to so no need to call smp_call_function_single(). > > > >> +} > >> + > >> static int etm4_enable_hw(struct etmv4_drvdata *drvdata) > >> { > >> int i, rc; > >> + struct amba_device *adev; > >> struct etmv4_config *config = &drvdata->config; > >> struct device *etm_dev = &drvdata->csdev->dev; > >> + struct device *dev = drvdata->csdev->dev.parent; > >> + > >> + adev = container_of(dev, struct amba_device, dev); > >> + /* > >> + * If ETM device is HiSilicon ETM device, reduce the > >> + * core-commit to avoid ETM overflow. > >> + */ > >> + if (adev->periphid == HISI_ETM_AMBA_ID_V1) > > Please could you move this check to the function above ? > Ideally, it would be good to have something like : > > etm4_config_impdef_features(); > > And : > > etm4_config_impdef_features(struct etm4_drvdata *drvdata) > { > etm4_cpu_hisilicon_config_core_commit(drvdata); > } > In addition to the above, Is it worth having this implementation defined code gated in the kernel configuration - like we do for core features sometimes? i,.e. CONFIG_ETM4X_IMPDEF_FEATURE (controls overall impdef support in the driver) and CONFIG_ETM4X_IMPDEF_HISILICON (depends on CONFIG_ETM4X_IMPDEF_FEATURE ) This way we keep non ETM architectural code off platforms that cannot use it / test it. > > > > Do you have any documentation on this back pressure feature? I doubt this is > > specific to Hip09 platform and as such would prefer to have a more generic > > approach that works on any platform that supports it. > > > > Anyone on the CS mailing list that knows what this is about? > > I believe this is hisilicon specific. May be same across their CPUs, may > be a specific one. There is no architectural guarantee. > This could be an implementation of the feature provided by the TRCSTALLCTRL register - which allows PE to be stalled in response to the ETM fifos approaching overflow. At present we do nothing with this feature as we have yet to see a target with it implemented, but if this is the case then it is an ETMv4 architectural feature that could be added into the main driver code, with use/access gated by the relevent TRCIDR bit. Regards Mike > > Cheers > Suzuki -- Mike Leach Principal Engineer, ARM Ltd. Manchester Design Centre. UK