Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1033827pxb; Fri, 13 Nov 2020 02:23:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJzYZDLsdDKzmyTRnvCi8yJ+uOHqgMO8fICxL0Cv1PWkFOCpTOl4jf+cUIXiYnYvY+L1owb9 X-Received: by 2002:a17:906:3092:: with SMTP id 18mr1209742ejv.43.1605262990292; Fri, 13 Nov 2020 02:23:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605262990; cv=none; d=google.com; s=arc-20160816; b=J9YQ7kfx5QwNnGilOs+a6Olma/KRLt+gm9WaBOP5x5+QePgNhmtNXGhroNmC3WwbOj vhsbMDUTr19kzgiBFQB/4ZGTI1N+TvPHLHDfgXslAGKyt7iyRJprzeQMY3/wF71y1mFY pF6yk0IuOlksTTRgts0YQsjhyeusDLeyG26G+d3BNqQFzbr/nSmkq0YfTST/ePwiJRd6 AG3BWMjctkgMCGB9Fj1GfpnPZOCynG1TdaIbZXhmxsJd7Gxcr5JD8kclWnYfDdP+X2EX V+imPQ8z4j2Qc+R+WXAPmPHcMev0Gshq52sxs1M2mqhMltmJAErg9hT1ZF0FrIAsD9mE DsNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=2s+vPEHatlo3rnNJ8OTdtDKXjLMGUeLfl9j8hD4JfHk=; b=qX99iCRdFrsx1YC/dVmQZxm3LnTck7kJYW0d6ZkzYtGEyMIyb+K8Juz1Eo8H1IhQwU 2urULNu3gpt6iUJbfBq+5y4Gpex0fnQzMP740H6mlBJ65Jgvje2LPZ/ZYUC6X+QOxiO+ NktDL3qKMSpkO/GCy/3R0Oy8ex7T6Iku/uFKsZXQ0OL01XyaF2AxTVYxNB45TpyWVtUU h0EcF0AJlqrjvRdvKEjSJUYAGSwNWh61S1UnBx+a+EBdr+lzywZsSBGg7S+EbVKr5/9l geJ10fnm2hP3HjykwJC8QHhjlVzoKdUiQM76Zb75fRr1AdYtcg+Y2HfnL1HLX5fcs+2O 2wVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g11si2117136ejb.468.2020.11.13.02.22.45; Fri, 13 Nov 2020 02:23:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726288AbgKMKSo (ORCPT + 99 others); Fri, 13 Nov 2020 05:18:44 -0500 Received: from szxga05-in.huawei.com ([45.249.212.191]:7535 "EHLO szxga05-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726176AbgKMKSn (ORCPT ); Fri, 13 Nov 2020 05:18:43 -0500 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.60]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4CXZDk713BzhlCs; Fri, 13 Nov 2020 18:18:30 +0800 (CST) Received: from [127.0.0.1] (10.65.95.32) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.487.0; Fri, 13 Nov 2020 18:18:33 +0800 Subject: Re: [RFC PATCH v2] coresight: etm4x: Modify core-commit of cpu to avoid the overflow of HiSilicon ETM To: Suzuki K Poulose , Mathieu Poirier References: <1597824397-29894-1-git-send-email-liuqi115@huawei.com> <20200827204426.GD22307@xps15> <548c973d-6964-ca5c-4c8d-fbc2386f3349@arm.com> <20200909162605.GB553266@xps15> <70f83c48-5a4e-5d4d-734f-105501d21a63@huawei.com> <20201111170345.GA3543438@xps15> <942b216e-9a17-7cc2-aedc-a2e003b00924@huawei.com> <93a2b528-ef4f-6217-e3ed-afd4a8eef179@arm.com> CC: Mike Leach , Greg Kroah-Hartman , linux-arm-kernel , Linux Kernel Mailing List , , Coresight ML From: Qi Liu Message-ID: <6fc3f71b-80b9-b28d-b39c-ecd001191927@huawei.com> Date: Fri, 13 Nov 2020 18:18:32 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: <93a2b528-ef4f-6217-e3ed-afd4a8eef179@arm.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.65.95.32] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/11/12 22:03, Suzuki K Poulose wrote: > On 11/12/20 1:09 PM, Qi Liu wrote: >> >> >> On 2020/11/12 1:03, Mathieu Poirier wrote: >>> On Wed, Nov 11, 2020 at 04:58:23PM +0800, Qi Liu wrote: >>>> Hi Mathieu, >>>> >>>> On 2020/9/10 0:26, Mathieu Poirier wrote: >>>>> On Wed, Sep 09, 2020 at 12:30:02PM +0100, Mike Leach wrote: >>>>>> Hi, >>>>>> >>>>>> On Wed, 2 Sep 2020 at 11:36, Suzuki K Poulose wrote: >>>>>>> On 08/27/2020 09:44 PM, Mathieu Poirier wrote: >>>>>>>> Hi Liu, >>>>>>>> >>>>>>>> On Wed, Aug 19, 2020 at 04:06:37PM +0800, Qi Liu wrote: >>>>>>>>> When too much trace information is generated on-chip, the ETM will >>>>>>>>> overflow, and cause data loss. This is a common phenomenon on ETM >>>>>>>>> devices. >>>>>>>>> >>>>>>>>> But sometimes we do not want to lose performance trace data, so we >>>>>>>>> suppress the speed of instructions sent from CPU core to ETM to >>>>>>>>> avoid the overflow of ETM. >>>>>>>>> >>>>>>>>> Signed-off-by: Qi Liu >>>>>>>>> --- >>>>>>>>> >>>>>>>>> Changes since v1: >>>>>>>>> - ETM on HiSilicon Hip09 platform supports backpressure, so does >>>>>>>>> not need to modify core commit. >>>>>>>>> >>>>>>>>> drivers/hwtracing/coresight/coresight-etm4x.c | 43 +++++++++++++++++++++++++++ >>>>>>>>> 1 file changed, 43 insertions(+) >>>>>>>>> >>>>>>>>> diff --git a/drivers/hwtracing/coresight/coresight-etm4x.c b/drivers/hwtracing/coresight/coresight-etm4x.c >>>>>>>>> index 7797a57..7641f89 100644 >>>>>>>>> --- a/drivers/hwtracing/coresight/coresight-etm4x.c >>>>>>>>> +++ b/drivers/hwtracing/coresight/coresight-etm4x.c >>>>>>>>> @@ -43,6 +43,10 @@ MODULE_PARM_DESC(boot_enable, "Enable tracing on boot"); >>>>>>>>> #define PARAM_PM_SAVE_NEVER 1 /* never save any state */ >>>>>>>>> #define PARAM_PM_SAVE_SELF_HOSTED 2 /* save self-hosted state only */ >>>>>>>>> >>>>>>>>> +#define CORE_COMMIT_CLEAR 0x3000 >>>>>>>>> +#define CORE_COMMIT_SHIFT 12 >>>>>>>>> +#define HISI_ETM_AMBA_ID_V1 0x000b6d01 >>>>>>>>> + >>>>>>>>> static int pm_save_enable = PARAM_PM_SAVE_FIRMWARE; >>>>>>>>> module_param(pm_save_enable, int, 0444); >>>>>>>>> MODULE_PARM_DESC(pm_save_enable, >>>>>>>>> @@ -104,11 +108,40 @@ struct etm4_enable_arg { >>>>>>>>> int rc; >>>>>>>>> }; >>>>>>>>> >>>>>>>>> +static void etm4_cpu_actlr1_cfg(void *info) >>>>>>>>> +{ >>>>>>>>> + struct etm4_enable_arg *arg = (struct etm4_enable_arg *)info; >>>>>>>>> + u64 val; >>>>>>>>> + >>>>>>>>> + asm volatile("mrs %0,s3_1_c15_c2_5" : "=r"(val)); >>>>>>> >>>>>>> The ID register (S3_1_C15_c2_5) falls into implementation defined space. >>>>>>> See Arm ARM DDI 0487F.a, section "D12.3.2 Reserved encodings for >>>>>>> IMPLEMENTATION DEFINED registers". >>>>>>> >>>>>>> So, please stop calling this "etm4_cpu_actlr1_cfg". Since, >>>>>>> 1) actlr1 is not an architected name for the said encoding >>>>>>> 2) The id register could mean something else on another CPU. >>>>>>> >>>>>>> Rather this should indicate platform/CPU specific. e.g, >>>>>>> >>>>>>> etm4_cpu_hisilicon_config_core_commit() >>>>>>> >>>>>>> >>>>>>>>> + val &= ~CORE_COMMIT_CLEAR; >>>>>>>>> + val |= arg->rc << CORE_COMMIT_SHIFT; >>>>>>>>> + asm volatile("msr s3_1_c15_c2_5,%0" : : "r"(val)); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static void etm4_config_core_commit(int cpu, int val) >>>>>>>>> +{ >>>>>>>>> + struct etm4_enable_arg arg = {0}; >>>>>>>>> + >>>>>>>>> + arg.rc = val; >>>>>>>>> + smp_call_function_single(cpu, etm4_cpu_actlr1_cfg, &arg, 1); >>>>>>>> Function etm4_enable/disable_hw() are already running on the CPU they are >>>>>>>> supposed to so no need to call smp_call_function_single(). >>>>>>>> >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> static int etm4_enable_hw(struct etmv4_drvdata *drvdata) >>>>>>>>> { >>>>>>>>> int i, rc; >>>>>>>>> + struct amba_device *adev; >>>>>>>>> struct etmv4_config *config = &drvdata->config; >>>>>>>>> struct device *etm_dev = &drvdata->csdev->dev; >>>>>>>>> + struct device *dev = drvdata->csdev->dev.parent; >>>>>>>>> + >>>>>>>>> + adev = container_of(dev, struct amba_device, dev); >>>>>>>>> + /* >>>>>>>>> + * If ETM device is HiSilicon ETM device, reduce the >>>>>>>>> + * core-commit to avoid ETM overflow. >>>>>>>>> + */ >>>>>>>>> + if (adev->periphid == HISI_ETM_AMBA_ID_V1) >>>>>>> Please could you move this check to the function above ? >>>>>>> Ideally, it would be good to have something like : >>>>>>> >>>>>>> etm4_config_impdef_features(); >>>>>>> >>>>>>> And : >>>>>>> >>>>>>> etm4_config_impdef_features(struct etm4_drvdata *drvdata) >>>>>>> { >>>>>>> etm4_cpu_hisilicon_config_core_commit(drvdata); >>>>>>> } >>>>>>> >>>>>> In addition to the above, Is it worth having this implementation >>>>>> defined code gated in the kernel configuration - like we do for core >>>>>> features sometimes? >>>>>> i,.e. >>>>>> CONFIG_ETM4X_IMPDEF_FEATURE (controls overall impdef support in the driver) >>>>>> and >>>>>> CONFIG_ETM4X_IMPDEF_HISILICON (depends on CONFIG_ETM4X_IMPDEF_FEATURE ) >>>>>> >>>>>> This way we keep non ETM architectural code off platforms that cannot >>>>>> use it / test it. >>>>>> >>>>> That's a good idea - they do the same for CPU erratas. >>>>> >>>> Considering that users sometimes use the same set of code on different platforms, how about >>>> using both CONFIG andperiphid to keep core-commit code off the platforms that do not >>>> need it? >>>> i, .e. >>>> CONFIG_ETM4X_IMPDEF_FEATURE ( controls overall impdef support in the driver ) >>>> periphid ( match impdef code with the target platform ) >>>> >>>> This way we could keep the same set of code working on different platforms, and it could help to >>>> ensure compatibility. >>> >>> I'm not 100% sure of what you mean by "same set of code working on different >>> platforms"... Up to know the way we have been handling peripheral IDs has >>> worked quite well and I don't intend on changing it unless there is a really >>> good reason. >>> >> Hi Mathieu, >> >> Perhaps I didn't make it clear and here is the code to express what I mean: >> >> #ifdef CONFIG_ETM4X_IMPDEF_FEATURE >> >> #define HISI_HIP08_AMBA_ID 0x000b6d01 >> #define HISI_HIP08_AMBA_MASK 0xfffff >> static void etm4_enable_arch_specific(struct etmv4_drvdata *drvdata) >> { >> struct device *dev = drvdata->csdev->dev.parent; >> struct amba_device *adev = container_of(dev, struct amba_device, dev); > > There is no guarantee that this is always an "AMBA" device, with this > patchset (which is still under review). Also, doing this check at > every time we enable/disable the ETM is not idea.. > > May be we should add a concept of "features" and use a bit mask instead, > which can be set at probe time, where we do have this information. > > #define ETM4x_IMPDEF_HISILICON_CORE_COMMIT 0 > #define ETM4x_IMPDEF_ARCH_N_FEATS 1 > > struct etmv4_drvdata { > > ... > DECALRE_BITMAP(arch_features, ETM4x_IMPDEF_ARCH_FEAT_MAX); > } > > struct etm4x_arch_feature { > void (*callback)(struct etmv4_drdvata *, bool enable); > }; > > static struct etm4x_arch_features[] = { > [ETM4x_IMPDEF_HISILICON_CORE_COMMIT] = { > .callback = etm4x_hisilicon_core_commit, > }, > {} > }; > > static void etm4_enable_arch_specific(struct etmv4_drvdata *drvdata) > { > for_each_set_bit(i, &drvdata->arch_features) { > struct etm4x_arch_feature *ftr = &etm4x_arch_features[i]; > > if (ftr->callback) > ftr->callback(drvdata, true); > } > } > > etm4x_check_arch_features() { > if (hisilicon_etm4x_match_pid) > set_bit(drvdata->arch_features, ETM4x_IMPDEF_HISILICON_CORE_COMMIT); > } > > etm4x_probe() { > > etm4x_check_arch_features(); > } > > Suzuki Hi Suzuki, Add a check in probe is a good idea, and perhaps we could also add CONFIG_ETM4X_IMPDEF_FEATURE here, like: etm4x_probe() { ... #ifdef CONFIG_ETM4X_IMPDEF_FEATURE etm4x_check_arch_features(); #endif } Thanks Qi > > . >