Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp55549pxx; Wed, 28 Oct 2020 18:01:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyWnyhMq5UWx1drM2MVQvBysyKf1i7eZj84PT00McQtNoA9t/hx8pN5mH+Y+7LgT7gQq1pD X-Received: by 2002:aa7:cf95:: with SMTP id z21mr1597343edx.346.1603933260927; Wed, 28 Oct 2020 18:01:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603933260; cv=none; d=google.com; s=arc-20160816; b=qOLv1Z8/F+pkktNhFYkfcgTJIB9CGPgTf8OscCUfBnOOuSMgQ4PlER+cUaAwC+qZ2V 55cqS11ElGnQ9AekL9FgLRtO9o7KrI8bqi2mVAJXlAwAhDheZXvKa8L3WIiFN7/TdSnW K0SjzHo6ryLWAGtXc+dns8AQ0pfaM9EqsQ/+iBp6JUUq35tnA5/b0VAUyXl6mgRb395s xLCzjNWUZy/LiyamEEHXGrvhnYEefxHLzY6ZLsEGDltmFyIs88kLQy79mf+TGDFd0dk3 udzJM5f49qQNwyMyRQJJ/6HXCxbv3kDrQeVyXNs37PoHlHYKxusWJibfDb6wh7MunA8r CtsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=20lP2y9ijChJTQhBZzJZL1LSzma3GRBLV/aQzDJ6FSY=; b=w4hryYm7vV3TTGQeaZBGCYDfCiQIq4FzPMBhJL2HV6ipVUbpvFvY9NHS59YE2nWxaq 2OqxEvdf2gCAwOr2mIpmXMQhfqvXT2KOnvw+gh211o5qCRhbXhYV0OTbmvMjRQugYFj4 HljTwYr3c0L+4GS1vbvkptRR4f7K7TEoiCfAbcnrHr0u99U7VUKAb5roQM2aEFl2KeE2 tAluocjhVLX336FEw9MQ7E7r3BT3lc5LuurMB4zQWpT/W9XmcMN7yWuXz1VdcyHQJy1g A4CvPujJBHuTlO3I3PXxqJoThhQUbVofBMp5feUswgOyORYZMrvQzoTgn9+yMylZDcPJ yM7g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f10si844415eds.576.2020.10.28.18.00.38; Wed, 28 Oct 2020 18:01:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730551AbgJ1WKh (ORCPT + 99 others); Wed, 28 Oct 2020 18:10:37 -0400 Received: from foss.arm.com ([217.140.110.172]:39146 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730497AbgJ1WKU (ORCPT ); Wed, 28 Oct 2020 18:10:20 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E85341764; Wed, 28 Oct 2020 15:10:19 -0700 (PDT) Received: from ewhatever.cambridge.arm.com (ewhatever.cambridge.arm.com [10.1.197.1]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 045363F68F; Wed, 28 Oct 2020 15:10:18 -0700 (PDT) From: Suzuki K Poulose To: linux-arm-kernel@lists.infradead.org Cc: mathieu.poirier@linaro.org, mike.leach@linaro.org, coresight@lists.linaro.org, linux-kernel@vger.kernel.org, Suzuki K Poulose Subject: [PATCH v3 17/26] coresight: etm4x: Cleanup secure exception level masks Date: Wed, 28 Oct 2020 22:09:36 +0000 Message-Id: <20201028220945.3826358-19-suzuki.poulose@arm.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20201028220945.3826358-1-suzuki.poulose@arm.com> References: <20201028220945.3826358-1-suzuki.poulose@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We rely on the ETM architecture version to decide whether Secure EL2 is available on the CPU for excluding the level for address comparators and viewinst main control register. We must instead use the TRCDIDR3.EXLEVEL_S field to detect the supported levels. Signed-off-by: Suzuki K Poulose --- drivers/hwtracing/coresight/coresight-etm4x-core.c | 13 +++---------- drivers/hwtracing/coresight/coresight-etm4x.h | 6 ++++-- 2 files changed, 7 insertions(+), 12 deletions(-) diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c index a12d58a04c5d..6e3f9cb7de3f 100644 --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c @@ -733,7 +733,6 @@ static void etm4_init_arch_data(void *info) * TRCARCHMAJ, bits[11:8] architecture major versin number */ drvdata->arch = BMVAL(etmidr1, 4, 11); - drvdata->config.arch = drvdata->arch; /* maximum size of resources */ etmidr2 = etm4x_relaxed_read32(csa, TRCIDR2); @@ -749,6 +748,7 @@ static void etm4_init_arch_data(void *info) drvdata->ccitmin = BMVAL(etmidr3, 0, 11); /* EXLEVEL_S, bits[19:16] Secure state instruction tracing */ drvdata->s_ex_level = BMVAL(etmidr3, 16, 19); + drvdata->config.s_ex_level = drvdata->s_ex_level; /* EXLEVEL_NS, bits[23:20] Non-secure state instruction tracing */ drvdata->ns_ex_level = BMVAL(etmidr3, 20, 23); @@ -920,16 +920,9 @@ static u64 etm4_get_ns_access_type(struct etmv4_config *config) static u64 etm4_get_access_type(struct etmv4_config *config) { u64 access_type = etm4_get_ns_access_type(config); - u64 s_hyp = (config->arch & 0x0f) >= 0x4 ? ETM_EXLEVEL_S_HYP : 0; - /* - * EXLEVEL_S, bits[11:8], don't trace anything happening - * in secure state. - */ - access_type |= (ETM_EXLEVEL_S_APP | - ETM_EXLEVEL_S_OS | - s_hyp | - ETM_EXLEVEL_S_MON); + /* All supported secure ELs are excluded */ + access_type |= (u64)config->s_ex_level << TRCACATR_EXLEVEL_SHIFT; return access_type; } diff --git a/drivers/hwtracing/coresight/coresight-etm4x.h b/drivers/hwtracing/coresight/coresight-etm4x.h index e7f6b7b16fb7..2ac4ecb0af61 100644 --- a/drivers/hwtracing/coresight/coresight-etm4x.h +++ b/drivers/hwtracing/coresight/coresight-etm4x.h @@ -546,6 +546,8 @@ /* PowerDown Control Register bits */ #define TRCPDCR_PU BIT(3) +#define TRCACATR_EXLEVEL_SHIFT 8 + /* secure state access levels - TRCACATRn */ #define ETM_EXLEVEL_S_APP BIT(8) #define ETM_EXLEVEL_S_OS BIT(9) @@ -615,7 +617,7 @@ * @vmid_mask0: VM ID comparator mask for comparator 0-3. * @vmid_mask1: VM ID comparator mask for comparator 4-7. * @ext_inp: External input selection. - * @arch: ETM architecture version (for arch dependent config). + * @s_ex_level: Secure ELs where tracing is supported. */ struct etmv4_config { u32 mode; @@ -659,7 +661,7 @@ struct etmv4_config { u32 vmid_mask0; u32 vmid_mask1; u32 ext_inp; - u8 arch; + u8 s_ex_level; }; /** -- 2.24.1