Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp5155480rwl; Sun, 8 Jan 2023 09:28:26 -0800 (PST) X-Google-Smtp-Source: AMrXdXslWUQtyZmPtcZhY3niFahptZ5lO7NYQiZlzDg2VvAK92PhG7bivGns9m25DI3sXkPap36Q X-Received: by 2002:a17:907:d389:b0:7c1:5a37:825 with SMTP id vh9-20020a170907d38900b007c15a370825mr68596051ejc.34.1673198906314; Sun, 08 Jan 2023 09:28:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673198906; cv=none; d=google.com; s=arc-20160816; b=egZpU7GABoXFnLeOCjU1Nu9F2/cHIWbb0GkqMaYHSoVyzgrry+XEx3XCXydDLadz1W SLVz6j4YSgIzDhUiE/ChaUOIEOv58O12SneP/5CCtyBe6Tk2Iv71NSNjwRtYAoaum0S8 YPCTQaZ9matqz3EyTlbAQ0PbXFnxD12aqnsdc03IxznxZtmvHK5g8lvTFaaNErKHBcOu CfR+9o2TvpoX6ECWJ4N+++ngYkodiMa5JCPl/JtD+ge2Dbj4s5+xKb8R73JrkeydsP8d tSApdCJBGYyheJN/4R4rwkYa8ROrqBad1xwqgFZMx06RTnt6EEu2W5Zq4aRJW8aK9EgD mpEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=svvTLZbmAqZCDyjj0CyF8c101X84ruDf4eVAVkKzEJw=; b=Bn5kRQ2AYdIv/U6KMJWTG8/wECr8w/s/N12AiLXToK1KTh8Ve1X9G93eEZl5AfUBZJ urIgLhiZbkmz/KNUQfNFtVRV1cpzHYMiA3BmKG2YGQVBwSgz5a6tRKEniGUKfjIFRaTh jc5/ryqQ6AIwnOgc/EmOcUtak/v/rRHukhC+Le//i03Rxn1g1Vd3crQMEdu+JmHf5Tr5 FWKmz3q1iI0z3SIfmstJCdkh53t74LTc1rUCXEENcu52925FIS7PujmfMLOqWJSvVNlm WqnTuSjcJr+C0MDhXYkur5npL7gu9dKXjE1UwYbz/rJFhlkJWOUcpMWUmn/AnhPn5lRw PHKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=crWcSojs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hc41-20020a17090716a900b0084cdfa2621asi7234009ejc.456.2023.01.08.09.28.14; Sun, 08 Jan 2023 09:28:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=crWcSojs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235924AbjAHRVG (ORCPT + 51 others); Sun, 8 Jan 2023 12:21:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52460 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233764AbjAHRUx (ORCPT ); Sun, 8 Jan 2023 12:20:53 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 88FFEBC3D for ; Sun, 8 Jan 2023 09:20:52 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 20538B80AC0 for ; Sun, 8 Jan 2023 17:20:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F312BC433F0; Sun, 8 Jan 2023 17:20:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673198449; bh=QXyLYBGTQIYpn1EZArlCDm9z3ZIpm2y0wkuHfDoqJ78=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=crWcSojsLcEZDkBRyGyiO8WuaKPIsP2VFRj+6eFq8g5lS41nTuL980qx/C8AvCDQ3 I5yvxwmchYPPtcbrKMMmePd60tKN1kslbcJGaqf38TowK/wYI8eTlLmxsILxl8MhaM GNuSkfhDRmxx8mAvC0nHFayGSXz6xohNUwWSEKpKZ/Ja7UjEbs1PK43CvAAxRjC9NE eK+pLa9FHrO6CI9c4yWcYKpDqwpC5bH+2iMgPxXbpU/0kbgNCzpR9VPgg8m1Ff1mGv 75STges8CtSw16uJnQn8jXPnQ6GR91/6OAIRrdW9z2MdwOl2xKjNIpFtxQDpyEy76S tt6HxsXddPrtw== From: Oded Gabbay To: linux-kernel@vger.kernel.org Cc: Ohad Sharabi Subject: [PATCH 4/7] habanalabs: define events to trace PCI LBW access Date: Sun, 8 Jan 2023 19:20:37 +0200 Message-Id: <20230108172040.3991204-4-ogabbay@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230108172040.3991204-1-ogabbay@kernel.org> References: <20230108172040.3991204-1-ogabbay@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ohad Sharabi There are cases where it may be useful to dump the whole LBW configs. Yet, doing so while spamming the kernel log will probably shade other important messages since the LBW access is done in sheer volume. To answer this we add trace events for those too. Signed-off-by: Ohad Sharabi Reviewed-by: Oded Gabbay Signed-off-by: Oded Gabbay --- include/trace/events/habanalabs.h | 39 +++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) diff --git a/include/trace/events/habanalabs.h b/include/trace/events/habanalabs.h index 10233e13cee4..951643e6a7a9 100644 --- a/include/trace/events/habanalabs.h +++ b/include/trace/events/habanalabs.h @@ -123,6 +123,45 @@ DEFINE_EVENT(habanalabs_comms_template, habanalabs_comms_wait_status_done, TP_PROTO(struct device *dev, char *op_str), TP_ARGS(dev, op_str)); +DECLARE_EVENT_CLASS(habanalabs_reg_access_template, + TP_PROTO(struct device *dev, u32 addr, u32 val), + + TP_ARGS(dev, addr, val), + + TP_STRUCT__entry( + __string(dname, dev_name(dev)) + __field(u32, addr) + __field(u32, val) + ), + + TP_fast_assign( + __assign_str(dname, dev_name(dev)); + __entry->addr = addr; + __entry->val = val; + ), + + TP_printk("%s: addr: %#x, val: %#x", + __get_str(dname), + __entry->addr, + __entry->val) +); + +DEFINE_EVENT(habanalabs_reg_access_template, habanalabs_rreg32, + TP_PROTO(struct device *dev, u32 addr, u32 val), + TP_ARGS(dev, addr, val)); + +DEFINE_EVENT(habanalabs_reg_access_template, habanalabs_wreg32, + TP_PROTO(struct device *dev, u32 addr, u32 val), + TP_ARGS(dev, addr, val)); + +DEFINE_EVENT(habanalabs_reg_access_template, habanalabs_elbi_read, + TP_PROTO(struct device *dev, u32 addr, u32 val), + TP_ARGS(dev, addr, val)); + +DEFINE_EVENT(habanalabs_reg_access_template, habanalabs_elbi_write, + TP_PROTO(struct device *dev, u32 addr, u32 val), + TP_ARGS(dev, addr, val)); + #endif /* if !defined(_TRACE_HABANALABS_H) || defined(TRACE_HEADER_MULTI_READ) */ /* This part must be outside protection */ -- 2.25.1