Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp28609pxf; Wed, 17 Mar 2021 14:23:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdQsxnGYUJchRx1BeZeJ7PYiZtuA/SMxFBWsnupSnfcue3pNQBi0ySSweaZKHf8YjwSFVq X-Received: by 2002:a17:907:2054:: with SMTP id pg20mr37613713ejb.213.1616016225361; Wed, 17 Mar 2021 14:23:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616016225; cv=none; d=google.com; s=arc-20160816; b=zX1Dzi0tNj+U2kWO30hA6Nm0fzq3wRWZOyUbGODcGcEWnpD2qTXydO0Z/6VT/DzBp/ I/XywdtBNV9CmcrX+gzfYdrDqf+K0UTkRqmzj3yVaiWGPC0hrZIU8/R2iJveca1Rd4hS usSJyZN41lO/6Pefodabuw2pQ4mNfugKAOhLoHpCvzC44j1OCKQdAn6sruy8BmfdJ78d 1qYsqLjqKY6jyTB/q1X9XPggpnZiWjKm8vCYHQH1dsv6ffVTc2nYaAjMnsUjdhJSxTkJ ubBoI21+VGXHocLEEy7J2Hk7P/I1hO/p1Uh9ad8AJ/aO5TC3f8hex8JWkEo/08PutJ9n OpOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=ABmEQK7k0d4RtWhDeFiXEcixsJixRYbiFKQWtkomMPQ=; b=aceGR8HFNHIlIbARfxllVrTrh6OSw9aTDWghCh8eZNsg73Zi5GJ1wzFGlyArFvYevs cPsZcVeOCLkibVGFC0ps1bMGOpIqBl8g8HfBg8uf0DREZoFiZDq/ftIH5AeqT7Lf5YU5 J421f0kOWXdaU5KZncH09XkJmmnbx5ZqUSi/7Dbtuu1ZiRsiEwpc5Mw7Yu/ZtVtOxREw k5dpzQi4H7WhkYKByiH0aVy8uyj+5kP9AnuzuRmn/uiT3XsWfmiZdBjEgIV99CUd7RZ7 OOB/6yAOZLnKq9G9d8ymIHWoJsRwsk5wRbyTwTzSTMZdcn08sQTGWETR3Jpkfq/gfT6N Hzlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=Tv3ARliU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a29si18425811edb.437.2021.03.17.14.23.22; Wed, 17 Mar 2021 14:23:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=Tv3ARliU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230041AbhCQRKI (ORCPT + 99 others); Wed, 17 Mar 2021 13:10:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33400 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229814AbhCQRJs (ORCPT ); Wed, 17 Mar 2021 13:09:48 -0400 Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2FC18C06174A for ; Wed, 17 Mar 2021 10:09:48 -0700 (PDT) Received: by mail-pj1-x1034.google.com with SMTP id x7-20020a17090a2b07b02900c0ea793940so3607497pjc.2 for ; Wed, 17 Mar 2021 10:09:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=ABmEQK7k0d4RtWhDeFiXEcixsJixRYbiFKQWtkomMPQ=; b=Tv3ARliU1iNPKpMdCio6RTSbAoNQZA7T8/fuzqgPuw4ADlNcJGKfYdwVYiBNDGDav1 7JJ1R33Hdemk8n/s0fcn20LFUQxe9/E2F+fUKBuhfTPWgVRaBjx+rt4amShgBhZDywo0 QUDPd3Nx2IltpU5mAO16PELm7QdR1lxhgQe+WpxQI8PJ9Ok4gXfjPDRwNSt7pqg4zKSU oGVKnDd14Tfk3tMmeI9Nsa8rFBMExPjFuuv2ClNcfer74L8ryILYRPQH5PuHhNsZNtCC Kf2anGHZJtodd6aFf4N3gLl5kvxtJKRKUMmk5xR6QWvnTIpCLDGmsutkDU3hixogJIMQ RQ2w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=ABmEQK7k0d4RtWhDeFiXEcixsJixRYbiFKQWtkomMPQ=; b=G30NW1dllRYMS3NTYpO0bwZpx0App73KrNovwFm9ejUBq6XkzoiDGi1ofGhCnfd8Fy 2AfYM9JBmUY5DNdX/I9wad03VMOix4FcOq/MpyzgJJH2f9C18Nq6EF/2gvgiqTIkPlcw yiX9iXh/tzQEHH3VZcNo4w5nDi8ZuoAfS+k635wyJ3j5FnMIoVus65cWyWFSSI5++BiQ ZnhdMKlKfxOHLAPt8cILuoCPjjDJjuwn9twtpCMLlnjfi0+y+/EWTsIcFty3b7kOl6uX UcPI+OPRyNc3jucqr8Uhg70xAhyelxeRQTGtZtxGqvmxGfLRKTqwx1Sl9wwU0haICdZo iydQ== X-Gm-Message-State: AOAM531uw9oDJzS9t9jOW/Ex5etIh3YvHltcmJbEfMseLG23t2lY35Tu aken+QxL6CsmCltRsc8aiB28vg== X-Received: by 2002:a17:902:e98c:b029:e5:defc:ccf8 with SMTP id f12-20020a170902e98cb02900e5defcccf8mr5515223plb.20.1616000987635; Wed, 17 Mar 2021 10:09:47 -0700 (PDT) Received: from xps15 (S0106889e681aac74.cg.shawcable.net. [68.147.0.187]) by smtp.gmail.com with ESMTPSA id l22sm20462709pfd.145.2021.03.17.10.09.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Mar 2021 10:09:46 -0700 (PDT) Date: Wed, 17 Mar 2021 11:09:45 -0600 From: Mathieu Poirier To: Suzuki K Poulose Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, mike.leach@linaro.org, anshuman.khandual@arm.com, leo.yan@linaro.org Subject: Re: [PATCH v4 09/19] coresight: etm4x: Move ETM to prohibited region for disable Message-ID: <20210317170945.GA1498234@xps15> References: <20210225193543.2920532-1-suzuki.poulose@arm.com> <20210225193543.2920532-10-suzuki.poulose@arm.com> <20210316193008.GD1387186@xps15> <7e8569f8-9da2-096c-a35a-14248329026a@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7e8569f8-9da2-096c-a35a-14248329026a@arm.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 17, 2021 at 10:44:51AM +0000, Suzuki K Poulose wrote: > Hi Mathieu > > On 3/16/21 7:30 PM, Mathieu Poirier wrote: > > On Thu, Feb 25, 2021 at 07:35:33PM +0000, Suzuki K Poulose wrote: > > > If the CPU implements Arm v8.4 Trace filter controls (FEAT_TRF), > > > move the ETM to trace prohibited region using TRFCR, while disabling. > > > > > > Cc: Mathieu Poirier > > > Cc: Mike Leach > > > Cc: Anshuman Khandual > > > Signed-off-by: Suzuki K Poulose > > > --- > > > New patch > > > > I would ask you to refrain from introducing new patches. Otherwise the goal > > posts keep on moving with every revision and we'll never get through. Fixes and > > enhancement can come in later patchsets. > > > > While I agree that this is a fix and a new patch, it also attests what > we do in the nvhe hypervisor to disable tracing while we enter the guest, by > using the Trace filter controls. > > > > --- > > > .../coresight/coresight-etm4x-core.c | 21 +++++++++++++++++-- > > > drivers/hwtracing/coresight/coresight-etm4x.h | 2 ++ > > > 2 files changed, 21 insertions(+), 2 deletions(-) > > > > > > diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c > > > index 15016f757828..00297906669c 100644 > > > --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c > > > +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c > > > @@ -31,6 +31,7 @@ > > > #include > > > #include > > > +#include > > > #include > > > #include > > > #include > > > @@ -654,6 +655,7 @@ static int etm4_enable(struct coresight_device *csdev, > > > static void etm4_disable_hw(void *info) > > > { > > > u32 control; > > > + u64 trfcr; > > > struct etmv4_drvdata *drvdata = info; > > > struct etmv4_config *config = &drvdata->config; > > > struct coresight_device *csdev = drvdata->csdev; > > > @@ -676,6 +678,16 @@ static void etm4_disable_hw(void *info) > > > /* EN, bit[0] Trace unit enable bit */ > > > control &= ~0x1; > > > + /* > > > + * If the CPU supports v8.4 Trace filter Control, > > > + * set the ETM to trace prohibited region. > > > + */ > > > + if (drvdata->trfc) { > > > + trfcr = read_sysreg_s(SYS_TRFCR_EL1); > > > + write_sysreg_s(trfcr & ~(TRFCR_ELx_ExTRE | TRFCR_ELx_E0TRE), > > > + SYS_TRFCR_EL1); > > > + isb(); > > > + } > > > /* > > > * Make sure everything completes before disabling, as recommended > > > * by section 7.3.77 ("TRCVICTLR, ViewInst Main Control Register, > > > @@ -683,12 +695,16 @@ static void etm4_disable_hw(void *info) > > > */ > > > dsb(sy); > > > isb(); > > > + /* Trace synchronization barrier, is a nop if not supported */ > > > + tsb_csync(); > > > etm4x_relaxed_write32(csa, control, TRCPRGCTLR); > > > /* wait for TRCSTATR.PMSTABLE to go to '1' */ > > > if (coresight_timeout(csa, TRCSTATR, TRCSTATR_PMSTABLE_BIT, 1)) > > > dev_err(etm_dev, > > > "timeout while waiting for PM stable Trace Status\n"); > > > + if (drvdata->trfc) > > > + write_sysreg_s(trfcr, SYS_TRFCR_EL1); > > > > drvdata->trfc is invariably set to true in cpu_enable_tracing() and as such > > testing for it is not required. > > That is not true. This is only set when the CPU supports trace filtering. > So, this is more of a capability field for the CPU where the ETM is bound. > Only v8.4+ CPUs implement trace filtering controls. Ah yes, you are correct - this patch makes sense now. > > Cheers > Suzuki > > > > > > > /* read the status of the single shot comparators */ > > > for (i = 0; i < drvdata->nr_ss_cmp; i++) { > > > @@ -873,7 +889,7 @@ static bool etm4_init_csdev_access(struct etmv4_drvdata *drvdata, > > > return false; > > > } > > > -static void cpu_enable_tracing(void) > > > +static void cpu_enable_tracing(struct etmv4_drvdata *drvdata) > > > { > > > u64 dfr0 = read_sysreg(id_aa64dfr0_el1); > > > u64 trfcr; > > > @@ -881,6 +897,7 @@ static void cpu_enable_tracing(void) > > > if (!cpuid_feature_extract_unsigned_field(dfr0, ID_AA64DFR0_TRACE_FILT_SHIFT)) > > > return; > > > + drvdata->trfc = true; > > > /* > > > * If the CPU supports v8.4 SelfHosted Tracing, enable > > > * tracing at the kernel EL and EL0, forcing to use the > > > @@ -1082,7 +1099,7 @@ static void etm4_init_arch_data(void *info) > > > /* NUMCNTR, bits[30:28] number of counters available for tracing */ > > > drvdata->nr_cntr = BMVAL(etmidr5, 28, 30); > > > etm4_cs_lock(drvdata, csa); > > > - cpu_enable_tracing(); > > > + cpu_enable_tracing(drvdata); > > > > At least for this patch, the above three hunks aren't needed. > > > > > } > > > static inline u32 etm4_get_victlr_access_type(struct etmv4_config *config) > > > diff --git a/drivers/hwtracing/coresight/coresight-etm4x.h b/drivers/hwtracing/coresight/coresight-etm4x.h > > > index 0af60571aa23..f6478ef642bf 100644 > > > --- a/drivers/hwtracing/coresight/coresight-etm4x.h > > > +++ b/drivers/hwtracing/coresight/coresight-etm4x.h > > > @@ -862,6 +862,7 @@ struct etmv4_save_state { > > > * @nooverflow: Indicate if overflow prevention is supported. > > > * @atbtrig: If the implementation can support ATB triggers > > > * @lpoverride: If the implementation can support low-power state over. > > > + * @trfc: If the implementation supports Arm v8.4 trace filter controls. > > > * @config: structure holding configuration parameters. > > > * @save_state: State to be preserved across power loss > > > * @state_needs_restore: True when there is context to restore after PM exit > > > @@ -912,6 +913,7 @@ struct etmv4_drvdata { > > > bool nooverflow; > > > bool atbtrig; > > > bool lpoverride; > > > + bool trfc; > > > > Nor is this one. > > > > > struct etmv4_config config; > > > struct etmv4_save_state *save_state; > > > bool state_needs_restore; > > > -- > > > 2.24.1 > > > >