Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1881292rwd; Wed, 17 May 2023 02:43:46 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5qv9GJvUjqNJavvBdyGe3O9/uSGpgRt2NpBzYYRjyKYB1vQo29xho+uf0eJsMBNz8LScfv X-Received: by 2002:a05:6a21:3298:b0:104:beb4:da38 with SMTP id yt24-20020a056a21329800b00104beb4da38mr20840671pzb.35.1684316625897; Wed, 17 May 2023 02:43:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684316625; cv=none; d=google.com; s=arc-20160816; b=yBs/5kuSApOVlX09BJ6sMy8+zECuainUVhiI/uhQvrf7LEYm+SA6sIrHpop0Blp2Ik NcKBMBtTWib6WWbOlcSE7hWMKixPPnXomiTDt1LITsxNUFeAmwZVEoYXtJGdfBcrmo4X L0rakfGS4gsybRGJUMjW/WYpQi0DYkBufqXURBWK9C17UvbDRmTP0P7e6g9moa9ET2kf T72DaXW1xR0kuum8axE+pMuHW/LmXv3kS7rBd6AaJG4eW4USVAAHkmcK29BkEgDMi6FG DsBgTJBBB/GwYIbYTW5J9Zg6ze0zHZ6rZYYk0qMRTOEUNOei7jrV1SuDnCcFRL9xHzAM Pd7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=AVcA9N6jtjeIzW4w2FDq7OupZhHzhpv/dcXqr/rV2CA=; b=MXoczhyv7f0DCiQBOMO5YeqqmvWp6NeDu2otKcgzhA9NMQ6vvgluJXHnkn25JKc/uA ICGsWsi4CJxPozg3dmT8QKpBlZlZVJr153mc26ZqJ/85gslmDvEc/X9ZJWGt7pZCRkDz LtZJlLnPFTNXWRvPkE8h96q0b+1KNpwu5BlbbXdGealwCQMkDQfAfaGADhoXmQluBd3r 4FeaXoAcFkfPZHwWb9hh229QBkKUqHSluNV4FfL3bwNzpTz/fptkfREfK/HuAxvJxJRN cgkonOJVZjkea9JzmKXS6Feu83ixnvX6C++LxnMv6FhTzeo2jE6RzgCCR9zbXnCehNu2 HVcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d129-20020a633687000000b00525030ba5acsi21214280pga.279.2023.05.17.02.43.32; Wed, 17 May 2023 02:43:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229999AbjEQJiy (ORCPT + 99 others); Wed, 17 May 2023 05:38:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43118 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229511AbjEQJix (ORCPT ); Wed, 17 May 2023 05:38:53 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C51B93C3B; Wed, 17 May 2023 02:38:50 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 434AD1FB; Wed, 17 May 2023 02:39:35 -0700 (PDT) Received: from [10.57.73.125] (unknown [10.57.73.125]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 24B3D3F663; Wed, 17 May 2023 02:38:48 -0700 (PDT) Message-ID: <420680f2-0d27-3174-532d-7f69760fc58d@arm.com> Date: Wed, 17 May 2023 10:38:46 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.10.0 Subject: Re: [PATCH V2 3/5] coresight: etm4x: Drop pid argument from etm4_probe() To: Anshuman Khandual , linux-arm-kernel@lists.infradead.org, coresight@lists.linaro.org Cc: scclevenger@os.amperecomputing.com, Rob Herring , Frank Rowand , Russell King , Greg Kroah-Hartman , "Rafael J. Wysocki" , Len Brown , Sudeep Holla , Lorenzo Pieralisi , Mathieu Poirier , Mike Leach , Leo Yan , devicetree@vger.kernel.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org References: <20230327050537.30861-1-anshuman.khandual@arm.com> <20230327050537.30861-4-anshuman.khandual@arm.com> <28c7a088-bfdb-5172-c7c4-0a572ecda78a@arm.com> From: Suzuki K Poulose In-Reply-To: <28c7a088-bfdb-5172-c7c4-0a572ecda78a@arm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17/05/2023 05:32, Anshuman Khandual wrote: > > > On 3/31/23 16:36, Suzuki K Poulose wrote: >> On 27/03/2023 06:05, Anshuman Khandual wrote: >>> Coresight device pid can be retrieved from its iomem base address, which is >>> stored in 'struct etm4x_drvdata'. This drops pid argument from etm4_probe() >>> and 'struct etm4_init_arg'. Instead etm4_check_arch_features() derives the >>> coresight device pid with a new helper coresight_get_pid(), right before it >>> is consumed in etm4_hisi_match_pid(). >>> >>> Cc: Mathieu Poirier >>> Cc: Suzuki K Poulose >>> Cc: Mike Leach >>> Cc: Leo Yan >>> Cc: coresight@lists.linaro.org >>> Cc: linux-arm-kernel@lists.infradead.org >>> Cc: linux-kernel@vger.kernel.org >>> Signed-off-by: Anshuman Khandual >>> --- >>>   .../coresight/coresight-etm4x-core.c          | 21 +++++++------------ >>>   include/linux/coresight.h                     | 12 +++++++++++ >>>   2 files changed, 20 insertions(+), 13 deletions(-) >>> >>> diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c >>> index 5d77571a8df9..3521838ab4fb 100644 >>> --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c >>> +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c >>> @@ -66,7 +66,6 @@ static u64 etm4_get_access_type(struct etmv4_config *config); >>>   static enum cpuhp_state hp_online; >>>     struct etm4_init_arg { >>> -    unsigned int        pid; >>>       struct device        *dev; >>>       struct csdev_access    *csa; >>>   }; >>> @@ -370,8 +369,10 @@ static void etm4_disable_arch_specific(struct etmv4_drvdata *drvdata) >>>   } >>>     static void etm4_check_arch_features(struct etmv4_drvdata *drvdata, >>> -                      unsigned int id) >>> +                     struct csdev_access *csa) >>>   { >>> +    unsigned int id = coresight_get_pid(csa); >>> + >> >> This throws up the following error on an ETE. >> >> ete: trying to read unsupported register @fe0 >> >> So, I guess this must be performed only for iomem based >> devices. System instruction based device must be identified >> by MIDR_EL1/REVIDR_EL1 if needed for specific erratum. >> This is not required now. So, we could bail out early >> if we are system instruction based device. > > Will bail out on non iomem devices via drvdata->base address switch. > > --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c > +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c > @@ -373,9 +373,10 @@ static void etm4_disable_arch_specific(struct etmv4_drvdata *drvdata) > static void etm4_check_arch_features(struct etmv4_drvdata *drvdata, > struct csdev_access *csa) > { > - unsigned int id = coresight_get_pid(csa); > + if (!drvdata->base) > + return; I would use !csa->io_mem to be more readerf friendly. > > - if (etm4_hisi_match_pid(id)) > + if (etm4_hisi_match_pid(coresight_get_pid(csa))) > set_bit(ETM4_IMPDEF_HISI_CORE_COMMIT, drvdata->arch_features); > } > #else > >> >> >>>       if (etm4_hisi_match_pid(id)) >>>           set_bit(ETM4_IMPDEF_HISI_CORE_COMMIT, drvdata->arch_features); >>>   } >>> @@ -385,7 +386,7 @@ static void etm4_disable_arch_specific(struct etmv4_drvdata *drvdata) >>>   } >>>     static void etm4_check_arch_features(struct etmv4_drvdata *drvdata, >>> -                     unsigned int id) >>> +                     struct csdev_access *csa) >>>   { >>>   } >>>   #endif /* CONFIG_ETM4X_IMPDEF_FEATURE */ >>> @@ -1165,7 +1166,7 @@ static void etm4_init_arch_data(void *info) >>>       etm4_os_unlock_csa(drvdata, csa); >>>       etm4_cs_unlock(drvdata, csa); >>>   -    etm4_check_arch_features(drvdata, init_arg->pid); >>> +    etm4_check_arch_features(drvdata, csa); >>>         /* find all capabilities of the tracing unit */ >>>       etmidr0 = etm4x_relaxed_read32(csa, TRCIDR0); >>> @@ -2048,7 +2049,7 @@ static int etm4_add_coresight_dev(struct etm4_init_arg *init_arg) >>>       return 0; >>>   } >>>   -static int etm4_probe(struct device *dev, u32 etm_pid) >>> +static int etm4_probe(struct device *dev) >>>   { >>>       struct etmv4_drvdata *drvdata = dev_get_drvdata(dev); >>>       struct csdev_access access = { 0 }; >>> @@ -2077,7 +2078,6 @@ static int etm4_probe(struct device *dev, u32 etm_pid) >>>         init_arg.dev = dev; >>>       init_arg.csa = &access; >>> -    init_arg.pid = etm_pid; >>>         /* >>>        * Serialize against CPUHP callbacks to avoid race condition >>> @@ -2124,7 +2124,7 @@ static int etm4_probe_amba(struct amba_device *adev, const struct amba_id *id) >>>         drvdata->base = base; >>>       dev_set_drvdata(dev, drvdata); >>> -    ret = etm4_probe(dev, id->id); >>> +    ret = etm4_probe(dev); >>>       if (!ret) >>>           pm_runtime_put(&adev->dev); >>>   @@ -2146,12 +2146,7 @@ static int etm4_probe_platform_dev(struct platform_device *pdev) >>>       pm_runtime_set_active(&pdev->dev); >>>       pm_runtime_enable(&pdev->dev); >>>   -    /* >>> -     * System register based devices could match the >>> -     * HW by reading appropriate registers on the HW >>> -     * and thus we could skip the PID. >>> -     */ >>> -    ret = etm4_probe(&pdev->dev, 0); >>> +    ret = etm4_probe(&pdev->dev); >>>         pm_runtime_put(&pdev->dev); >>>       return ret; >>> diff --git a/include/linux/coresight.h b/include/linux/coresight.h >>> index f19a47b9bb5a..f85b041ea475 100644 >>> --- a/include/linux/coresight.h >>> +++ b/include/linux/coresight.h >>> @@ -370,6 +370,18 @@ static inline u32 csdev_access_relaxed_read32(struct csdev_access *csa, >>>       return csa->read(offset, true, false); >>>   } >>>   +#define CORESIGHT_PIDRn(i)    (0xFE0 + ((i) * 4)) >>> + >>> +static inline u32 coresight_get_pid(struct csdev_access *csa) >>> +{ >>> +    u32 i, pid = 0; >>> + >>> +    for (i = 0; i < 4; i++) >>> +        pid |= csdev_access_relaxed_read32(csa, CORESIGHT_PIDRn(i)) << (i * 8); >> >> Given the above, we could make this iomem specific. > > We could change coresight_get_pid() to take iomem base address instead > and fetch the pid. But is not the existing csdev_access based approach > better and more generic ? Yes, true, lets leave it with csdev_access, as it is coresight specific and not ETMv4. Cheers Suzuki