Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp985445rwb; Thu, 6 Oct 2022 07:08:10 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4yvSG6q6pJJC4ew+jpkmQjaJ5wE18TcfGwfyXhIJOtkjwhuzJl/NSd6Il3vx5QJYTEwuaL X-Received: by 2002:a17:903:32c2:b0:17f:7e13:87db with SMTP id i2-20020a17090332c200b0017f7e1387dbmr4860137plr.119.1665065290589; Thu, 06 Oct 2022 07:08:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665065290; cv=none; d=google.com; s=arc-20160816; b=uNsmL+HN+oRTla21ip3yNtrrCHHO7BD5GLZoRL11+uNmzQjZs41q5Q76yfhGYEWyAi dV+0OZdQrkaoFsn34JDADXXON5l9yTC4s7vHasQR93GCQiDqR0u6t3S0Ct7v/giAtdk5 X30ueCVjvKoGJB7yqgy8ut1ZSULKU8kZQ+L8u1dHpeyeVSbXQmGdZLs5HduzuoL9NaAB uJ03DacXFoN3+1NnsYnowuWIveNBK8bEPCOf1WpT4OQ0l5bRKBL2um/C00k88HdHAPgZ vIydbHQx6E34rRkPWBLn+k2PooDvAGYWGloxhmEzx8NyBATjEocEl7aI2J/S1Q9w7ZDu rG5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=0qrBCsffF+OzBtil4CiWgpjzAyR5Sm/F+e7aMlo+drk=; b=VqPX+1MgV9rDLxoqKSNR4dFIyp9lrgs1P6P35wRvT0ALxnXjqTmaDOTEzVK1m9KTQv edRM/IllclAX6ZYULQ6m2otqKGEepdtVSbSBPj/8zb5GEli9LrwXVsEdR2aQeAilICec uWux160c3Kj8ShMHKgkFE0BjPJx5xKqeDYO9domhzu5M3KfSx9IBntM0UJXYtNkiepAT k9PJJpykSmpDkIJWjbg9evCdKoGJE+tPMHb2XwlJc/xpMVsB+Cx0NoDTTp3za1ZOzcP0 F4iEA4s+Ogr4LHjB7+9DF8xLlJabLvBnNQJEeNUylPU0C3d/MNqr6Jr5cxjnDNhouGa9 hsyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=bcYNj7ot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mw10-20020a17090b4d0a00b001f31da6b2d2si5671894pjb.154.2022.10.06.07.07.36; Thu, 06 Oct 2022 07:08:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=bcYNj7ot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230461AbiJFNrh (ORCPT + 99 others); Thu, 6 Oct 2022 09:47:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45836 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230189AbiJFNrd (ORCPT ); Thu, 6 Oct 2022 09:47:33 -0400 Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com [IPv6:2607:f8b0:4864:20::1036]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 110399E6A3 for ; Thu, 6 Oct 2022 06:47:32 -0700 (PDT) Received: by mail-pj1-x1036.google.com with SMTP id b15so1815731pje.1 for ; Thu, 06 Oct 2022 06:47:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=0qrBCsffF+OzBtil4CiWgpjzAyR5Sm/F+e7aMlo+drk=; b=bcYNj7otG27a4HRY7t4puzZK/eY+V2ARox3OEhymv6DGtAtqCKglefyozcmY78vev4 EJO4jIcQxPW3q95dWYR/7/6RcUrgHZyCF+FL6aR1ggPYUnJzqR9DSW2K/eY07l7lBTNu fYLlAi504D9YVqaZvqRjP+sQzanWx6h2ns4dSbdIgYz0WbUEyI+sKM+bugHupvVHapDU N3+TOsjHxSzMQIKOApA7r+PUjEvuD+M9hmKU0EASqHvGh8IrSXkfNB6pWqCoepFqIkYr myGtjdCIopvzGh5nuX4nHsxCCPoEAbSkLWpdh0ri5oHHyuBocorKM6wu5K/Yd+9k68AM YNDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=0qrBCsffF+OzBtil4CiWgpjzAyR5Sm/F+e7aMlo+drk=; b=J1a+tb6BYICjl23texF/W9VEyKeF8AsLrJedzn9S3ACUrw7pVOZnbKvL16AeGixJb/ Mo8jS1kMlZ9LTRqPLHukd/7uawo6jgM580RSv8xrTt4osS8gJ3wZVV+7ml/IoK0PD/k/ YLZ9x5P9vkHip1ZWbbK4gcvt7iyz/CPDyOS9wrQtmduOHW7+drMBfSnBsamfoD5LXYBU M7coxR0AHDgl0FN7a3wmJX28s1bR2H9N4dYo24u69fREf2go0J88UQjGOqv3OyA3fP4X Fvv/sOP+7DdT1W6iTcXZbczQFr7+B/eKmyLEBgk2aKUquQTSxt92aRr4jZhuUuJl2Exk xTAQ== X-Gm-Message-State: ACrzQf3YxO27f0RGrSq6twKHPari4xcakN8+h/9QXbm6pD6mOhuXT2Sd KiwvaNfF9M6tgPkHRbjVlCkRhXWj6/oai6xMouKNbw== X-Received: by 2002:a17:902:dac4:b0:178:3037:680a with SMTP id q4-20020a170902dac400b001783037680amr4938961plx.37.1665064051364; Thu, 06 Oct 2022 06:47:31 -0700 (PDT) MIME-Version: 1.0 References: <20220809223401.24599-1-mike.leach@linaro.org> <20220809223401.24599-5-mike.leach@linaro.org> <01570ba2-81c9-e4b5-6669-0e4087a4bd1f@arm.com> <8f865045-aa95-46b6-a455-c3d9c6d26494@arm.com> In-Reply-To: <8f865045-aa95-46b6-a455-c3d9c6d26494@arm.com> From: Mike Leach Date: Thu, 6 Oct 2022 14:47:19 +0100 Message-ID: Subject: Re: [PATCH v3 04/13] coresight: etm4x: Update ETM4 driver to use Trace ID API To: Suzuki K Poulose Cc: coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, mathieu.poirier@linaro.org, peterz@infradead.org, mingo@redhat.com, acme@kernel.org, linux-perf-users@vger.kernel.org, leo.yan@linaro.org, quic_jinlmao@quicinc.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Suzuki, On Mon, 3 Oct 2022 at 10:37, Suzuki K Poulose wrote: > > On 03/10/2022 10:31, Suzuki K Poulose wrote: > > On 09/08/2022 23:33, Mike Leach wrote: > >> The trace ID API is now used to allocate trace IDs for ETM4.x / ETE > >> devices. > >> > >> For perf sessions, these will be allocated on enable, and released on > >> disable. > >> > >> For sysfs sessions, these will be allocated on enable, but only released > >> on reset. This allows the sysfs session to interrogate the Trace ID used > >> after the session is over - maintaining functional consistency with the > >> previous allocation scheme. > >> > >> The trace ID will also be allocated on read of the mgmt/trctraceid file. > >> This ensures that if perf or sysfs read this before enabling trace, the > >> value will be the one used for the trace session. > >> > >> Trace ID initialisation is removed from the _probe() function. > >> > >> Signed-off-by: Mike Leach > >> --- > >> .../coresight/coresight-etm4x-core.c | 79 +++++++++++++++++-- > >> .../coresight/coresight-etm4x-sysfs.c | 27 ++++++- > >> drivers/hwtracing/coresight/coresight-etm4x.h | 3 + > >> 3 files changed, 100 insertions(+), 9 deletions(-) > >> > >> diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c > >> b/drivers/hwtracing/coresight/coresight-etm4x-core.c > >> index cf249ecad5a5..b4fb28ce89fd 100644 > >> --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c > >> +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c > >> @@ -42,6 +42,7 @@ > >> #include "coresight-etm4x-cfg.h" > >> #include "coresight-self-hosted-trace.h" > >> #include "coresight-syscfg.h" > >> +#include "coresight-trace-id.h" > >> static int boot_enable; > >> module_param(boot_enable, int, 0444); > >> @@ -234,6 +235,50 @@ static int etm4_trace_id(struct coresight_device > >> *csdev) > >> return drvdata->trcid; > >> } > >> +int etm4_read_alloc_trace_id(struct etmv4_drvdata *drvdata) > >> +{ > >> + int trace_id; > >> + > >> + /* > >> + * This will allocate a trace ID to the cpu, > >> + * or return the one currently allocated. > >> + */ > >> + /* trace id function has its own lock */ > >> + trace_id = coresight_trace_id_get_cpu_id(drvdata->cpu); > >> + if (IS_VALID_ID(trace_id)) > >> + drvdata->trcid = (u8)trace_id; > >> + else > >> + dev_err(&drvdata->csdev->dev, > >> + "Failed to allocate trace ID for %s on CPU%d\n", > >> + dev_name(&drvdata->csdev->dev), drvdata->cpu); > >> + return trace_id; > >> +} > >> + > >> +static int etm4_set_current_trace_id(struct etmv4_drvdata *drvdata) > >> +{ > >> + int trace_id; > >> + > >> + /* > >> + * Set the currently allocated trace ID - perf allocates IDs > >> + * as part of setup_aux for all CPUs it may use. > >> + */ > >> + trace_id = coresight_trace_id_read_cpu_id(drvdata->cpu); > >> + if (IS_VALID_ID(trace_id)) { > >> + drvdata->trcid = (u8)trace_id; > >> + return 0; > >> + } > >> + > >> + dev_err(&drvdata->csdev->dev, "Failed to set trace ID for %s on > >> CPU%d\n", > >> + dev_name(&drvdata->csdev->dev), drvdata->cpu); > >> + > >> + return -EINVAL; > >> +} > > > > > >> + > >> +void etm4_release_trace_id(struct etmv4_drvdata *drvdata) > >> +{ > >> + coresight_trace_id_put_cpu_id(drvdata->cpu); > >> +} > >> + > >> struct etm4_enable_arg { > >> struct etmv4_drvdata *drvdata; > >> int rc; > >> @@ -729,6 +774,15 @@ static int etm4_enable_perf(struct > >> coresight_device *csdev, > >> ret = etm4_parse_event_config(csdev, event); > >> if (ret) > >> goto out; > >> + > >> + /* > >> + * perf allocates cpu ids as part of setup - device needs to use > >> + * the allocated ID. > >> + */ > >> + ret = etm4_set_current_trace_id(drvdata); > > > > So, when do we allocate an id in perf mode ? As far as I can see, this > > should be the same as etm4_read_alloc_trace_id() ? Why are they any > > different ? > > Trace IDs are allocated in etm_setup_aux(), then released in free_event_data(). This way the value are guaranteed to remain constant for the entire session,. We cannot release an ID when a given ETM stops tracing, as it may restart later for the same perf session. In between these two events perf takes its own locks - for whatever reason. If we use read_alloc trace id - which takes that allocation / release lock in the ID system then we see at lot of LOCKDEP issues at this point. Hence we do a safe unlocked read of the value - perf will never release the value till after the session is completed and the event is released. > >> + if (ret < 0) > >> + goto out; > >> + > >> /* And enable it */ > >> ret = etm4_enable_hw(drvdata); > >> @@ -753,6 +807,11 @@ static int etm4_enable_sysfs(struct > >> coresight_device *csdev) > >> spin_lock(&drvdata->spinlock); > >> + /* sysfs needs to read and allocate a trace ID */ > >> + ret = etm4_read_alloc_trace_id(drvdata); > >> + if (ret < 0) > >> + goto unlock_sysfs_enable; > >> + > >> /* > >> * Executing etm4_enable_hw on the cpu whose ETM is being enabled > >> * ensures that register writes occur when cpu is powered. > >> @@ -764,6 +823,11 @@ static int etm4_enable_sysfs(struct > >> coresight_device *csdev) > >> ret = arg.rc; > >> if (!ret) > >> drvdata->sticky_enable = true; > >> + > >> + if (ret) > >> + etm4_release_trace_id(drvdata); > >> + > >> +unlock_sysfs_enable: > >> spin_unlock(&drvdata->spinlock); > >> if (!ret) > >> @@ -895,6 +959,8 @@ static int etm4_disable_perf(struct > >> coresight_device *csdev, > >> /* TRCVICTLR::SSSTATUS, bit[9] */ > >> filters->ssstatus = (control & BIT(9)); > >> + /* The perf event will release trace ids when it is destroyed */ > >> + > > > > At this patch level, there is no release of trace id ? Is that missed in > > this patch ? Or am I missing something ? > See above - perf allocation is handled in coresight-etm-perf.c. > I think the above change only comes in PATCH 7. May be that patch needs > to be rearranged in order ? Otherwise git-bisect can break running a > perf session on cs_etm, with missing traceid. > This is probably true - we can move the perf allocation to before the ETM changes as the extended backward compatibility introduced this set should permit it. > Suzuki Thanks for the review Mike -- Mike Leach Principal Engineer, ARM Ltd. Manchester Design Centre. UK