Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3035294pxb; Fri, 12 Feb 2021 07:39:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJyCGempp4jt3lpeYEsIEbo9altbiIQyCeaxfUHIOtKjRDV7+sTEfD8fLwlYGLUhz2rqwV0Y X-Received: by 2002:a50:e0c1:: with SMTP id j1mr3709581edl.275.1613144392428; Fri, 12 Feb 2021 07:39:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613144392; cv=none; d=google.com; s=arc-20160816; b=t5B3qrkHi2tCYtV9bflQBXRNUNombdfxtK0qcWCmpIXQ+wbuxb3t56QZasJodX5Acq fjX2fNV2Dh0l6W8J+slWu+hl82kht9qmNQaSgIgr6wbcXFGLxRQ+/BcCck1jr8axgpZv o2ePIzFIm3Nnooc0bKlNB7loZp4rUxwRbUinUu4k7WcgJe1rNpc2aOEieYMcba9WLCeG tSTXfmI/Ko2H/c8ylHe7MHAlc/a0134R6SLk+H/VZaYt2RgosuQ/LTJqs3Gnp/wLPZi3 nXSieMQCDKyA1TI8yEjfml+qZlO82KriNTroUimEhW7EtxTWTGhzm8esuNAu7OdFP70a WfOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=FGr4lFhXb5gzuL+3CBv5NJxQZDDGIrhjU5ea3ruOT8o=; b=MseHWh9y1yFU4+j/+7Zw6ZbWB7UDIGD+N4lf6fsFY3leiu2MlN+6P4AiW1u3hZk/wp r0tPDdvGqc1CBTqVyOE5Ph4HjH6I16QwvnMaoAf1RT3t4CWPGWtF1P0F273Gmiqm7NCh LdgYjmxsI4AGDO5DnVhfqSRbnQIwzIPEsB2VGtkvUBzscg8MupQXtxigDZZOMeQHsorE HHdSaBdY5guMKzhYC1vtDxhQC8Lgyu1eWrFxFAHVIhutmpU37aqhoM3pk43GNIFVAxnt 6JTm+gL0jDvxn/TY/p5ZcY3eGuX3RKV95ibwcLFHrwrGU93ur93GS3JBtjEK1je79JLY WraQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f10si6483207edc.491.2021.02.12.07.39.29; Fri, 12 Feb 2021 07:39:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230043AbhBLPiB (ORCPT + 99 others); Fri, 12 Feb 2021 10:38:01 -0500 Received: from foss.arm.com ([217.140.110.172]:38822 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232097AbhBLPhf (ORCPT ); Fri, 12 Feb 2021 10:37:35 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 90C4B1063; Fri, 12 Feb 2021 07:36:47 -0800 (PST) Received: from [10.57.44.108] (unknown [10.57.44.108]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4DD243F73B; Fri, 12 Feb 2021 07:36:45 -0800 (PST) Subject: Re: [PATCH v7 28/28] coresight: Add support for v8.4 SelfHosted tracing To: Mike Leach Cc: linux-arm-kernel , Coresight ML , Mathieu Poirier , Anshuman Khandual , Leo Yan , Linux Kernel Mailing List , Jonathan Zhou , Catalin Marinas , Will Deacon References: <20210110224850.1880240-1-suzuki.poulose@arm.com> <20210110224850.1880240-29-suzuki.poulose@arm.com> From: Suzuki K Poulose Message-ID: <72f85de4-5b39-c963-78cf-2f8347e21268@arm.com> Date: Fri, 12 Feb 2021 15:36:33 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mike On 2/12/21 10:34 AM, Mike Leach wrote: > Hi Mathieu, Suzuki, > > Sorry for the really late response on this patch, but I noticed a > problem while doing a review of the ETE / TRBE set. (TRBE specs > mention TRFCR_ELx, so I was confirming a couple of things). > > On Sun, 10 Jan 2021 at 22:49, Suzuki K Poulose wrote: >> >> From: Jonathan Zhou >> >> v8.4 tracing extensions added support for trace filtering controlled >> by TRFCR_ELx. This must be programmed to allow tracing at EL1/EL2 and >> EL0. The timestamp used is the virtual time. Also enable CONTEXIDR_EL2 >> tracing if we are running the kernel at EL2. >> >> Cc: Catalin Marinas >> Cc: Mike Leach >> Cc: Will Deacon >> Reviewed-by: Mathieu Poirier >> Signed-off-by: Jonathan Zhou >> [ Move the trace filtering setup etm_init_arch_data() and >> clean ups] >> Signed-off-by: Suzuki K Poulose >> --- >> .../coresight/coresight-etm4x-core.c | 25 +++++++++++++++++++ >> 1 file changed, 25 insertions(+) >> >> diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c >> index 3d3165dd09d4..18c1a80abab8 100644 >> --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c >> +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c >> @@ -859,6 +859,30 @@ static bool etm4_init_csdev_access(struct etmv4_drvdata *drvdata, >> return false; >> } >> >> +static void cpu_enable_tracing(void) >> +{ >> + u64 dfr0 = read_sysreg(id_aa64dfr0_el1); >> + u64 trfcr; >> + >> + if (!cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_TRACE_FILT_SHIFT)) >> + return; >> + >> + /* >> + * If the CPU supports v8.4 SelfHosted Tracing, enable >> + * tracing at the kernel EL and EL0, forcing to use the >> + * virtual time as the timestamp. >> + */ >> + trfcr = (TRFCR_ELx_TS_VIRTUAL | >> + TRFCR_ELx_ExTRE | >> + TRFCR_ELx_E0TRE); >> + >> + /* If we are running at EL2, allow tracing the CONTEXTIDR_EL2. */ >> + if (is_kernel_in_hyp_mode()) >> + trfcr |= TRFCR_EL2_CX; >> + > > This is wrong - CX bit is present on TRFCR_EL2, not TRFCR_EL1. Why is this wrong ? We do this only when we are in EL2. > Moreover, TRFCR_EL2 has a separate enables for tracing at EL0 and EL2. > True, that is for EL0&2 translation regimes. i.e, tracing EL0 with the kernel running at EL2. But bits TRFCR_EL2.E2TRE == TRFCR_EL1.E1TRE If notice, we name the bit TRFCR_ELx_ExTRE. And E0TRE == E0HTRE. So we do the following : 1) When kernel running at EL2: Enable tracing at EL2 and EL0 and context tracking 2) When kernel running at EL1: Enable tracing at EL1 and EL0. > Secondly - is this correct in principal? Should the driver not be > reading the access it is permitted by the kernel, rather than giving > itself unfettered access to trace where it wants to. I dont follow the "access permitted by the kernel" here. What are we referrring to ? > Surely TRFCR_ELx levels should be chosen in KConfig and then should > be set up in kernel initialisation? I disagree with yet another Kconfig. This basic requirement for enabling the trace collection. It is not something that we can optionally use from the architecture. So we should transparently do the right thing for making sure that we set up the system for something that didn't require any other steps. Or in other words, if we add a Kconfig option for TRFCR programming, if someone forgets to select it when they upgraded the kernel they are in for a surprisingly long debugging to find why the trace doesnt work. As for the TRFCR programming, we have two choices. etm4x driver or generic boot up for the CPU. I preferred to do this in the driver as we can enable it only if trace drivers are available. Cheers Suzuki > > Regards > > Mike > > > >> + write_sysreg_s(trfcr, SYS_TRFCR_EL1); >> +} >> + >> static void etm4_init_arch_data(void *info) >> { >> u32 etmidr0; >> @@ -1044,6 +1068,7 @@ static void etm4_init_arch_data(void *info) >> /* NUMCNTR, bits[30:28] number of counters available for tracing */ >> drvdata->nr_cntr = BMVAL(etmidr5, 28, 30); >> etm4_cs_lock(drvdata, csa); >> + cpu_enable_tracing(); >> } >> >> static inline u32 etm4_get_victlr_access_type(struct etmv4_config *config) >> -- >> 2.24.1 >> > > > -- > Mike Leach > Principal Engineer, ARM Ltd. > Manchester Design Centre. UK >