Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp269770pxu; Thu, 7 Jan 2021 04:43:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJybhv/7b6xNTLloR+4zarb3JvHtymQUqtpQlH9smaCdxbWtGtXhKbICFntyowRff/3ILAQ+ X-Received: by 2002:a50:8e19:: with SMTP id 25mr1530520edw.263.1610023408894; Thu, 07 Jan 2021 04:43:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610023408; cv=none; d=google.com; s=arc-20160816; b=SwNz+GqJC3DfIbAgRGxqCU/8Jd/vuedVwx4swmEzqY43ESyqx35CqMfuqNz511uNKq pgnIT50ZQc82Sya3x8FYaYtmEJoq8YNltfMTnXlHle6joWsX1WC4QSbogqI9/vI9axKv SRJeZrdYmHRcRPC1nL2issD8LXSbob7slfmp5wGMNDtGcJ+GHOMEN56sh9Wveu5LWPZK rZku0f+MyOOWlXrVezoSAzCnRks7TKQsEzhTIiPp6SmBoAxgBJbUYx5G7MrQON7GKo40 zgdVCaK9zubz89aS6izC8jBicfbr3V+6YS33by5yPJk3Fk51p6gT5fQqWDCI9BdDEec6 gHyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=gPD0I5tcyrSZzOguFzKzHt8PGPalpq8IyOxo1uqOomg=; b=SpHN9yBGJuHC3neSEviVkizh2DnhwiHjPZZuYaNjnQF8SUCJJR6t4/NBd8FhWo9Y8i RrVhNirexKQjE9mZird6hi74i8oLlAteDfLhj6VfatJ/xvhdkUPFkmgayTUBuLf/dtGC NJrijlTtraNBacWlW9ygUP60x8AMBWiuxkoTZvZfnIxvY1nqgeyQbeErJCmKg1qsSxLO JcPNj2D+fAjchFYH67UGlpuEqLMC60tOtoeaC01Qrv04Ru2Sx68SHVWQdUy14es9rOmI GHJCQ78aPTL5mqgKl2nfD5QLxGumYWUyOJ0/wkLMYIHrQHmW0PoyLCyBFmBjEZu9ddJd vmbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si2116366ejr.643.2021.01.07.04.43.05; Thu, 07 Jan 2021 04:43:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728447AbhAGMky (ORCPT + 99 others); Thu, 7 Jan 2021 07:40:54 -0500 Received: from foss.arm.com ([217.140.110.172]:59952 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728415AbhAGMkv (ORCPT ); Thu, 7 Jan 2021 07:40:51 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 392BA1478; Thu, 7 Jan 2021 04:39:32 -0800 (PST) Received: from ewhatever.cambridge.arm.com (ewhatever.cambridge.arm.com [10.1.197.1]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 1F0C43F719; Thu, 7 Jan 2021 04:39:31 -0800 (PST) From: Suzuki K Poulose To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, coresight@lists.linaro.org, mathieu.poirier@linaro.org, leo.yan@linaro.org, mike.leach@linaro.org, anshuman.khandual@arm.com, Suzuki K Poulose Subject: [PATCH v6 13/26] coresight: etm4x: Cleanup secure exception level masks Date: Thu, 7 Jan 2021 12:38:46 +0000 Message-Id: <20210107123859.674252-14-suzuki.poulose@arm.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20210107123859.674252-1-suzuki.poulose@arm.com> References: <20210107123859.674252-1-suzuki.poulose@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We rely on the ETM architecture version to decide whether Secure EL2 is available on the CPU for excluding the level for address comparators and viewinst main control register. We must instead use the TRCDIDR3.EXLEVEL_S field to detect the supported levels. Reviewed-by: Mathieu Poirier Signed-off-by: Suzuki K Poulose --- drivers/hwtracing/coresight/coresight-etm4x-core.c | 13 +++---------- drivers/hwtracing/coresight/coresight-etm4x.h | 6 ++++-- 2 files changed, 7 insertions(+), 12 deletions(-) diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c index f947d6ddf9e3..ead8f5dd8483 100644 --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c @@ -840,7 +840,6 @@ static void etm4_init_arch_data(void *info) * TRCARCHMAJ, bits[11:8] architecture major versin number */ drvdata->arch = BMVAL(etmidr1, 4, 11); - drvdata->config.arch = drvdata->arch; /* maximum size of resources */ etmidr2 = etm4x_relaxed_read32(csa, TRCIDR2); @@ -856,6 +855,7 @@ static void etm4_init_arch_data(void *info) drvdata->ccitmin = BMVAL(etmidr3, 0, 11); /* EXLEVEL_S, bits[19:16] Secure state instruction tracing */ drvdata->s_ex_level = BMVAL(etmidr3, 16, 19); + drvdata->config.s_ex_level = drvdata->s_ex_level; /* EXLEVEL_NS, bits[23:20] Non-secure state instruction tracing */ drvdata->ns_ex_level = BMVAL(etmidr3, 20, 23); @@ -1027,16 +1027,9 @@ static u64 etm4_get_ns_access_type(struct etmv4_config *config) static u64 etm4_get_access_type(struct etmv4_config *config) { u64 access_type = etm4_get_ns_access_type(config); - u64 s_hyp = (config->arch & 0x0f) >= 0x4 ? ETM_EXLEVEL_S_HYP : 0; - /* - * EXLEVEL_S, bits[11:8], don't trace anything happening - * in secure state. - */ - access_type |= (ETM_EXLEVEL_S_APP | - ETM_EXLEVEL_S_OS | - s_hyp | - ETM_EXLEVEL_S_MON); + /* All supported secure ELs are excluded */ + access_type |= (u64)config->s_ex_level << TRCACATR_EXLEVEL_SHIFT; return access_type; } diff --git a/drivers/hwtracing/coresight/coresight-etm4x.h b/drivers/hwtracing/coresight/coresight-etm4x.h index 91d789ddf17d..0b7bdfd1e1b2 100644 --- a/drivers/hwtracing/coresight/coresight-etm4x.h +++ b/drivers/hwtracing/coresight/coresight-etm4x.h @@ -550,6 +550,8 @@ /* PowerDown Control Register bits */ #define TRCPDCR_PU BIT(3) +#define TRCACATR_EXLEVEL_SHIFT 8 + /* secure state access levels - TRCACATRn */ #define ETM_EXLEVEL_S_APP BIT(8) #define ETM_EXLEVEL_S_OS BIT(9) @@ -624,7 +626,7 @@ enum etm_impdef_type { * @vmid_mask0: VM ID comparator mask for comparator 0-3. * @vmid_mask1: VM ID comparator mask for comparator 4-7. * @ext_inp: External input selection. - * @arch: ETM architecture version (for arch dependent config). + * @s_ex_level: Secure ELs where tracing is supported. */ struct etmv4_config { u32 mode; @@ -668,7 +670,7 @@ struct etmv4_config { u32 vmid_mask0; u32 vmid_mask1; u32 ext_inp; - u8 arch; + u8 s_ex_level; }; /** -- 2.24.1