From: Mathieu Poirier <mathieu.poirier@linaro.org>
To: Suzuki K Poulose <suzuki.poulose@arm.com>
Cc: saiprakash.ranjan@codeaurora.org, linux-arm-msm@vger.kernel.org,
linux-kernel@vger.kernel.org, swboyd@chromium.org,
linux-arm-kernel@lists.infradead.org, mike.leach@linaro.org
Subject: Re: [PATCH] coresight: tmc: Read TMC mode only when TMC hw is enabled
Date: Mon, 13 Apr 2020 10:56:38 -0600 [thread overview]
Message-ID: <20200413165638.GA28804@xps15> (raw)
In-Reply-To: <9a792e3e-5a17-156d-4b59-4a3ec8f9993e@arm.com>
On Mon, Apr 13, 2020 at 12:17:21AM +0100, Suzuki K Poulose wrote:
> Hi Sai,
>
> On 04/09/2020 12:35 PM, Sai Prakash Ranjan wrote:
> > Reading TMC mode register in tmc_read_prepare_etb without
> > enabling the TMC hardware leads to async exceptions like
> > the one in the call trace below. This can happen if the
> > user tries to read the TMC etf data via device node without
> > setting up source and the sink first which enables the TMC
> > hardware in the path. So make sure that the TMC is enabled
> > before we try to read TMC data.
>
> So, one can trigger the same SError by simply :
>
> $ cat /sys/bus/coresight/device/tmc_etb0/mgmt/mode
A true TMC-ETB is a rarity nowadays... What boards was this tested on? I don't
know if it is how the IP behaves or how things are connected on Sai's specific
board but doing echo'ing tmc_etf0/mgmt/mode on my Juno R0 doesn't give rise to
any problems. That certainly doesn't mean it can't happen on another platform.
>
>
> And also :
>
> >
> > Kernel panic - not syncing: Asynchronous SError Interrupt
> > CPU: 7 PID: 2605 Comm: hexdump Tainted: G S 5.4.30 #122
> > Call trace:
> > dump_backtrace+0x0/0x188
> > show_stack+0x20/0x2c
> > dump_stack+0xdc/0x144
> > panic+0x168/0x36c
> > panic+0x0/0x36c
> > arm64_serror_panic+0x78/0x84
> > do_serror+0x130/0x138
> > el1_error+0x84/0xf8
> > tmc_read_prepare_etb+0x88/0xb8
> > tmc_open+0x40/0xd8
> > misc_open+0x120/0x158
> > chrdev_open+0xb8/0x1a4
> > do_dentry_open+0x268/0x3a0
> > vfs_open+0x34/0x40
> > path_openat+0x39c/0xdf4
> > do_filp_open+0x90/0x10c
> > do_sys_open+0x150/0x3e8
> > __arm64_compat_sys_openat+0x28/0x34
> > el0_svc_common+0xa8/0x160
> > el0_svc_compat_handler+0x2c/0x38
> > el0_svc_compat+0x8/0x10
> >
> > Fixes: 4525412a5046 ("coresight: tmc: making prepare/unprepare functions generic")
> > Reported-by: Stephen Boyd <swboyd@chromium.org>
> > Signed-off-by: Sai Prakash Ranjan <saiprakash.ranjan@codeaurora.org>
> > ---
> > drivers/hwtracing/coresight/coresight-tmc.c | 5 +++++
> > drivers/hwtracing/coresight/coresight-tmc.h | 1 +
> > 2 files changed, 6 insertions(+)
> >
> > diff --git a/drivers/hwtracing/coresight/coresight-tmc.c b/drivers/hwtracing/coresight/coresight-tmc.c
> > index 1cf82fa58289..7bae69748ab7 100644
> > --- a/drivers/hwtracing/coresight/coresight-tmc.c
> > +++ b/drivers/hwtracing/coresight/coresight-tmc.c
> > @@ -62,11 +62,13 @@ void tmc_flush_and_stop(struct tmc_drvdata *drvdata)
> > void tmc_enable_hw(struct tmc_drvdata *drvdata)
> > {
> > + drvdata->enable = true;
> > writel_relaxed(TMC_CTL_CAPT_EN, drvdata->base + TMC_CTL);
> > }
> > void tmc_disable_hw(struct tmc_drvdata *drvdata)
> > {
> > + drvdata->enable = false;
> > writel_relaxed(0x0, drvdata->base + TMC_CTL);
> > }
> > @@ -102,6 +104,9 @@ static int tmc_read_prepare(struct tmc_drvdata *drvdata)
> > {
> > int ret = 0;
> > + if (!drvdata->enable)
> > + return -EINVAL;
> > +
Proceeding this way would mean that ETB and ETF internal memory buffers can't be
read unless the device is enabled and collecting trace. That is not practical
because 1) it changes the way the sysfs interface works on all boards where
there isn't a problem and 2) it makes it very difficult to capture the correct
data.
When the device is __not__ enabled, does reading any of the registers under
"/sys/bus/coresight/devices/tmc_etbX/mgmt/" also cause a problem or is it just
'mode'?
Thanks,
Mathieu
>
> Does this check always guarantee that the TMC is enabled when
> we actually get to reading the MODE ? This needs to be done
> under the spinlock.
>
> Cheers
> Suzuki
>
>
>
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
prev parent reply other threads:[~2020-04-13 16:56 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-09 11:35 [PATCH] coresight: tmc: Read TMC mode only when TMC hw is enabled Sai Prakash Ranjan
2020-04-09 19:34 ` Stephen Boyd
2020-04-12 23:17 ` Suzuki K Poulose
2020-04-13 8:25 ` Sai Prakash Ranjan
2020-04-13 17:14 ` Mathieu Poirier
2020-04-14 15:47 ` Sai Prakash Ranjan
2020-04-15 15:56 ` Mathieu Poirier
2020-04-16 16:17 ` Sai Prakash Ranjan
2020-04-13 16:56 ` Mathieu Poirier [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200413165638.GA28804@xps15 \
--to=mathieu.poirier@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mike.leach@linaro.org \
--cc=saiprakash.ranjan@codeaurora.org \
--cc=suzuki.poulose@arm.com \
--cc=swboyd@chromium.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).