Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp457219pxk; Wed, 9 Sep 2020 09:39:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzx5BjGJB1KWjAFbH7r3iCrkUwt0NRrY1tBn9eodaZgxjVHotRIA9AmnjSGARleadzOI1yt X-Received: by 2002:a17:906:6682:: with SMTP id z2mr4745353ejo.434.1599669558813; Wed, 09 Sep 2020 09:39:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599669558; cv=none; d=google.com; s=arc-20160816; b=LeSu9aKF+dKX1LCTMt7UtKovEsjgq7M9+9YUxQZt7eQB5JWyU4ewnNlaMjqAqnqOJ1 Vw3/Y2m5QjXBfekDZI6ZQM9+Ogvevd8FmLOe+OXoN9DN+zLtfVBJc7GArgIeGezf5xhU JLpgRkn5n+mpyj/LOmYpIBT9VBWRN+svGP7/3NhLV6W3UhD0/KNWQqZaKr+LTsV+lw51 PZ4eQfnrMGdPcdZytjiErRIpQ8566oSfKoleC4yFScD+XF7F50XJ4rx6j0yx1kc4p0WX O7exl5kFweJ7yL/87dtI2gZYKyw5QjXoD3h9F/JHRgVSsFqEZDfb+Mp6mTFWHrKYrvYu AlZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Ur0jsYUj72BqgbcrHRQljmDeSLUciAGdL7rcnu/ICrQ=; b=RO+SxT6RWSNRo1zYaw8/7ZicV0xfMJAaqcljTZdnJ/cTgWv77zu3vg4fYUDj1DJ6sx sJW/XgfebICudHB9XGpkTcjYhbdo8I4+CVGmSKSVdq4A9uamOzXeamusN+7LHqz1KK/V TrA+cY8/4/CuRXJCYeop0FkkSQU1LIJOl9LUp+lFu472c9CxTQxI5b4GM2PReu7AwO8d OH2w+pZaTshj+dtZRiy5VqV0A4QJDCoPPI/U4oDULWLKTy+Pr13ILxKiswUVHRHEypu3 OGJfKkuFyls4E694nsxtC05jZzryB4anLZjbJPSPZZIKRtTxSXOw3+wxWIJHoX5kz6iy o6Ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=zsDBJ8Ay; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y13si2012583edj.275.2020.09.09.09.38.54; Wed, 09 Sep 2020 09:39:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=zsDBJ8Ay; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731135AbgIIQgA (ORCPT + 99 others); Wed, 9 Sep 2020 12:36:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56170 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730949AbgIIQ0L (ORCPT ); Wed, 9 Sep 2020 12:26:11 -0400 Received: from mail-pg1-x542.google.com (mail-pg1-x542.google.com [IPv6:2607:f8b0:4864:20::542]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4DD0DC061799 for ; Wed, 9 Sep 2020 09:26:08 -0700 (PDT) Received: by mail-pg1-x542.google.com with SMTP id v15so2438578pgh.6 for ; Wed, 09 Sep 2020 09:26:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=Ur0jsYUj72BqgbcrHRQljmDeSLUciAGdL7rcnu/ICrQ=; b=zsDBJ8Ay5xaEkF/FfyJBAdmUhPz2eDWzkABSH82qTlpMEWaYpTT2gtQBJgT/fzb0EF lxWJEmQ3HpS5fT3HE19viHDtDsvzQEyKA8Vl3fE4xMpVC5iuvThEwRi8HGRozlN/ZgSp bhg3Vq5PdpT89gNH3fUstvcPJkBb5+8t/mgqnmKpoMMZjE3PpinxaceQG0xXRhGwuSDv Z0H2LjYjZFI+dzZiw2jgbJjX8sP7MMpNsYxIzqF7XD4Rfc5t8xrsyRFWT93zci7UhhhM hW/ElpGkiOj0Ht/KQMxW+MpHyykp08QUMz/gRSqgukZ+B3xMuC6APDIp/gdjwps3oNF9 gtzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Ur0jsYUj72BqgbcrHRQljmDeSLUciAGdL7rcnu/ICrQ=; b=ttdfGz4ttvDEmA1LG7O5BRMEoiiZS5chnnGqCp4yO53WEdYCHTDznqPNuyzhwA2I2S KVy5i4bZwYjI/dQm6Mmkm3kkPEBHY1rTeMBl61iogHV2nxil3yQcVwP8Vg3Z0o2m2iqM LLrf6gFDi6HB5NyS65hnr80Gw1yoHg3HXMEzxTv+ZljvYdQ8iD5fNYXJdwCyG7d0y7Qt iAhWQVZ4n60tGod7ZUeiCzKvEskMvTG9NRV/mcFnNq+vw+xw6QrR+IcuJIAGTtXvsflI aV2rxK4AIRT/0c7dw5lRdIEdWqLEyIyEnbOc+zt1/+KZ26s7TqbMCOqOefp8bthTmbRU Yr7A== X-Gm-Message-State: AOAM530n9hoq4cypYrDR8O5QMCMhnkvOWQpmcwdOof/GuMNavG9d5vhU LtNmnT4q7CYUoQmEB9GaPM9k2A== X-Received: by 2002:a17:902:b108:b029:d0:cbe1:e740 with SMTP id q8-20020a170902b108b02900d0cbe1e740mr1641016plr.27.1599668767760; Wed, 09 Sep 2020 09:26:07 -0700 (PDT) Received: from xps15 (S0106002369de4dac.cg.shawcable.net. [68.147.8.254]) by smtp.gmail.com with ESMTPSA id gm17sm2388308pjb.46.2020.09.09.09.26.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Sep 2020 09:26:07 -0700 (PDT) Date: Wed, 9 Sep 2020 10:26:05 -0600 From: Mathieu Poirier To: Mike Leach Cc: Suzuki K Poulose , liuqi115@huawei.com, Greg Kroah-Hartman , linux-arm-kernel , Linux Kernel Mailing List , linuxarm@huawei.com, Coresight ML Subject: Re: [RFC PATCH v2] coresight: etm4x: Modify core-commit of cpu to avoid the overflow of HiSilicon ETM Message-ID: <20200909162605.GB553266@xps15> References: <1597824397-29894-1-git-send-email-liuqi115@huawei.com> <20200827204426.GD22307@xps15> <548c973d-6964-ca5c-4c8d-fbc2386f3349@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 09, 2020 at 12:30:02PM +0100, Mike Leach wrote: > Hi, > > On Wed, 2 Sep 2020 at 11:36, Suzuki K Poulose wrote: > > > > On 08/27/2020 09:44 PM, Mathieu Poirier wrote: > > > Hi Liu, > > > > > > On Wed, Aug 19, 2020 at 04:06:37PM +0800, Qi Liu wrote: > > >> When too much trace information is generated on-chip, the ETM will > > >> overflow, and cause data loss. This is a common phenomenon on ETM > > >> devices. > > >> > > >> But sometimes we do not want to lose performance trace data, so we > > >> suppress the speed of instructions sent from CPU core to ETM to > > >> avoid the overflow of ETM. > > >> > > >> Signed-off-by: Qi Liu > > >> --- > > >> > > >> Changes since v1: > > >> - ETM on HiSilicon Hip09 platform supports backpressure, so does > > >> not need to modify core commit. > > >> > > >> drivers/hwtracing/coresight/coresight-etm4x.c | 43 +++++++++++++++++++++++++++ > > >> 1 file changed, 43 insertions(+) > > >> > > >> diff --git a/drivers/hwtracing/coresight/coresight-etm4x.c b/drivers/hwtracing/coresight/coresight-etm4x.c > > >> index 7797a57..7641f89 100644 > > >> --- a/drivers/hwtracing/coresight/coresight-etm4x.c > > >> +++ b/drivers/hwtracing/coresight/coresight-etm4x.c > > >> @@ -43,6 +43,10 @@ MODULE_PARM_DESC(boot_enable, "Enable tracing on boot"); > > >> #define PARAM_PM_SAVE_NEVER 1 /* never save any state */ > > >> #define PARAM_PM_SAVE_SELF_HOSTED 2 /* save self-hosted state only */ > > >> > > >> +#define CORE_COMMIT_CLEAR 0x3000 > > >> +#define CORE_COMMIT_SHIFT 12 > > >> +#define HISI_ETM_AMBA_ID_V1 0x000b6d01 > > >> + > > >> static int pm_save_enable = PARAM_PM_SAVE_FIRMWARE; > > >> module_param(pm_save_enable, int, 0444); > > >> MODULE_PARM_DESC(pm_save_enable, > > >> @@ -104,11 +108,40 @@ struct etm4_enable_arg { > > >> int rc; > > >> }; > > >> > > >> +static void etm4_cpu_actlr1_cfg(void *info) > > >> +{ > > >> + struct etm4_enable_arg *arg = (struct etm4_enable_arg *)info; > > >> + u64 val; > > >> + > > >> + asm volatile("mrs %0,s3_1_c15_c2_5" : "=r"(val)); > > > > > > The ID register (S3_1_C15_c2_5) falls into implementation defined space. > > See Arm ARM DDI 0487F.a, section "D12.3.2 Reserved encodings for > > IMPLEMENTATION DEFINED registers". > > > > So, please stop calling this "etm4_cpu_actlr1_cfg". Since, > > 1) actlr1 is not an architected name for the said encoding > > 2) The id register could mean something else on another CPU. > > > > Rather this should indicate platform/CPU specific. e.g, > > > > etm4_cpu_hisilicon_config_core_commit() > > > > > > >> + val &= ~CORE_COMMIT_CLEAR; > > >> + val |= arg->rc << CORE_COMMIT_SHIFT; > > >> + asm volatile("msr s3_1_c15_c2_5,%0" : : "r"(val)); > > >> +} > > >> + > > >> +static void etm4_config_core_commit(int cpu, int val) > > >> +{ > > >> + struct etm4_enable_arg arg = {0}; > > >> + > > >> + arg.rc = val; > > >> + smp_call_function_single(cpu, etm4_cpu_actlr1_cfg, &arg, 1); > > > > > > Function etm4_enable/disable_hw() are already running on the CPU they are > > > supposed to so no need to call smp_call_function_single(). > > > > > >> +} > > >> + > > >> static int etm4_enable_hw(struct etmv4_drvdata *drvdata) > > >> { > > >> int i, rc; > > >> + struct amba_device *adev; > > >> struct etmv4_config *config = &drvdata->config; > > >> struct device *etm_dev = &drvdata->csdev->dev; > > >> + struct device *dev = drvdata->csdev->dev.parent; > > >> + > > >> + adev = container_of(dev, struct amba_device, dev); > > >> + /* > > >> + * If ETM device is HiSilicon ETM device, reduce the > > >> + * core-commit to avoid ETM overflow. > > >> + */ > > >> + if (adev->periphid == HISI_ETM_AMBA_ID_V1) > > > > Please could you move this check to the function above ? > > Ideally, it would be good to have something like : > > > > etm4_config_impdef_features(); > > > > And : > > > > etm4_config_impdef_features(struct etm4_drvdata *drvdata) > > { > > etm4_cpu_hisilicon_config_core_commit(drvdata); > > } > > > > In addition to the above, Is it worth having this implementation > defined code gated in the kernel configuration - like we do for core > features sometimes? > i,.e. > CONFIG_ETM4X_IMPDEF_FEATURE (controls overall impdef support in the driver) > and > CONFIG_ETM4X_IMPDEF_HISILICON (depends on CONFIG_ETM4X_IMPDEF_FEATURE ) > > This way we keep non ETM architectural code off platforms that cannot > use it / test it. > That's a good idea - they do the same for CPU erratas. > > > > > > > Do you have any documentation on this back pressure feature? I doubt this is > > > specific to Hip09 platform and as such would prefer to have a more generic > > > approach that works on any platform that supports it. > > > > > > Anyone on the CS mailing list that knows what this is about? > > > > I believe this is hisilicon specific. May be same across their CPUs, may > > be a specific one. There is no architectural guarantee. > > > > This could be an implementation of the feature provided by the > TRCSTALLCTRL register - which allows PE to be stalled in response to > the ETM fifos approaching overflow. > At present we do nothing with this feature as we have yet to see a > target with it implemented, but if this is the case then it is an > ETMv4 architectural feature that could be added into the main driver > code, with use/access gated by the relevent TRCIDR bit. > > Regards > > Mike > > > > > > Cheers > > Suzuki > > > > -- > Mike Leach > Principal Engineer, ARM Ltd. > Manchester Design Centre. UK