From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 41626C388F7 for ; Mon, 9 Nov 2020 20:22:37 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D59E0206C0 for ; Mon, 9 Nov 2020 20:22:36 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="J6RaF/7A"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="m0q+MCN4" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D59E0206C0 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=PGqnokYLdl0tQ8YwvUd2nMC/07ldRIeREdf3AgoPNv8=; b=J6RaF/7A0Bf6yPHtWgweC/cUx b49R3y55dUed8r4Xb15D1eYBPGfjPU7HP++ngZJC9yVniVpcRD05ucIAHgOBHCZxctSTBASJTOCVt rFh3rEBMSz+GwHGZiev+XK5axEZJ5Fx5qDhf63BGEutaZskQdsqaa68+oJRMjM+cOMWRJr82mSEpz k5zyc5xaqsLGa8Q6FvysZWhR1MS0l7h5YSsksW/rdhsVND6myRSHfs+TmXsyVPZTzqzH+N7v+i2jm 7ptk6kO/CUkh7/ZF56146Wws16bEdQucl9AFV1KtcBPnT5ThiWkv/rr4qLjaohuHGsDWWkt0pIgoj ntjU9a6tw==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kcDg3-0002wL-Rj; Mon, 09 Nov 2020 20:22:11 +0000 Received: from mail-pl1-x643.google.com ([2607:f8b0:4864:20::643]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kcDg1-0002vV-V1 for linux-arm-kernel@lists.infradead.org; Mon, 09 Nov 2020 20:22:10 +0000 Received: by mail-pl1-x643.google.com with SMTP id z1so5278270plo.12 for ; Mon, 09 Nov 2020 12:22:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=bW2hYDR209olnXN7rEKOa9sbiMCdvyzNIoGJT+r5Th4=; b=m0q+MCN4z/B4HIjSft5rFOLyJWJjL4X59tEoxLp2dG8/re6+bIA52UvFwJu6iWSRe2 ovY6o3jcTzaCtKOjuDVCKVPpW3N9r3hFjTBYvBaeiuEe4kSsczH+3sEXxwt7hvALHPiO aInQbPLNGueJD4/8yhrOwlsz4VvGxFBeaGkveO6x9a3XWFfBUI/6zpszW3mi1V9cfJ4O ZMSI6arZV0t+3WHBC6suCTRnqmiaUkHkzFF1QQ6W4bvT55PH6TodsN8SXBjIxQvyTToi gYgllIpCkWC8eHLT56/RoB2WyPROYdJrCVpVNkUD/5GyPCjZ3mPZvXMrZ0nlpL2GwUtx Qlaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=bW2hYDR209olnXN7rEKOa9sbiMCdvyzNIoGJT+r5Th4=; b=nagqQsqoseCS7v2s1R15Ih6RYdMrqGKWXrsPwk+Ecel71wdpdhA25I2At6IAlfJ+8b v7OQ9d2lKD6jdG2RKRWFElTAO6fNI9huPNQ6cBtPfM/xNBullgThQ6X9uaBAOXAzDhRh dt/yO+0BmH7WNR2pxS6Bo82Cu4ttaehPqpptu+xii7eK6pgQPbAyRHKja2+XfrvQIgWs zTlAvyHyX8vlOJxG6TPMYaYwsG3TX855Nh1dXK5zTN7Cz6HfSGxd5adjwFgn9IQTvJYJ WtvVyRdi6ZY3b935O1jSdVMlKtPvifQMhfUb77pes9+N2Eqic7yNA+Epp5ButnX6bklV KXIg== X-Gm-Message-State: AOAM530WWQXBa654L9U2nLes1S4CmmYf+BKq3wNotUGtE5ArjxYGKi+7 02wXoRmGjW5GVKtF0sjiLpmkKA== X-Google-Smtp-Source: ABdhPJyUpJGtVedeyiGxpoPznItI4efoY3gfkjO4R69ezeXWSMB1IQukg4nRItyv6CeGUx04n+SOEg== X-Received: by 2002:a17:902:74c7:b029:d7:e593:fcb with SMTP id f7-20020a17090274c7b02900d7e5930fcbmr4950180plt.71.1604953327574; Mon, 09 Nov 2020 12:22:07 -0800 (PST) Received: from xps15 (S0106002369de4dac.cg.shawcable.net. [68.147.8.254]) by smtp.gmail.com with ESMTPSA id m10sm319905pjr.3.2020.11.09.12.22.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Nov 2020 12:22:06 -0800 (PST) Date: Mon, 9 Nov 2020 13:22:05 -0700 From: Mathieu Poirier To: Suzuki K Poulose Subject: Re: [PATCH v3 23/26] coresight: etm4x: Detect system instructions support Message-ID: <20201109202205.GB3396611@xps15> References: <20201028220945.3826358-1-suzuki.poulose@arm.com> <20201028220945.3826358-25-suzuki.poulose@arm.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20201028220945.3826358-25-suzuki.poulose@arm.com> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201109_152210_031354_AADA649A X-CRM114-Status: GOOD ( 23.08 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: coresight@lists.linaro.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, mike.leach@linaro.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Wed, Oct 28, 2020 at 10:09:42PM +0000, Suzuki K Poulose wrote: > ETM v4.4 onwards adds support for system instruction access > to the ETM. Detect the support on an ETM and switch to using the > mode when available. > > Signed-off-by: Suzuki K Poulose > --- > .../coresight/coresight-etm4x-core.c | 39 +++++++++++++++++++ > 1 file changed, 39 insertions(+) > > diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c > index 4bc2f15b6332..dc537b5612eb 100644 > --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c > +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c > @@ -675,6 +675,37 @@ static const struct coresight_ops etm4_cs_ops = { > .source_ops = &etm4_source_ops, > }; > > +static inline bool cpu_supports_sysreg_trace(void) > +{ > + u64 dfr0 = read_sysreg_s(SYS_ID_AA64DFR0_EL1); > + > + return ((dfr0 >> ID_AA64DFR0_TRACEVER_SHIFT) & 0xfUL) > 0; I would do: return ((dfr0 >> ID_AA64DFR0_TRACEVER_SHIFT) & 0xfUL) == 1; Because any other value than '1' are reserved. > +} > + > +static bool etm_init_sysreg_access(struct etmv4_drvdata *drvdata, > + struct csdev_access *csa) > +{ > + u32 devarch; > + > + if (!cpu_supports_sysreg_trace()) > + return false; > + > + /* > + * ETMs implementing sysreg access must implement TRCDEVARCH. > + */ > + devarch = read_etm4x_sysreg_const_offset(TRCDEVARCH); > + if ((devarch & ETM_DEVARCH_ID_MASK) != ETM_DEVARCH_ETMv4x_ARCH) > + return false; > + *csa = (struct csdev_access) { > + .io_mem = false, > + .read = etm4x_sysreg_read, > + .write = etm4x_sysreg_write, > + }; > + > + drvdata->arch = etm_devarch_to_arch(devarch); > + return true; > +} > + > static bool etm_init_iomem_access(struct etmv4_drvdata *drvdata, > struct csdev_access *csa) > { > @@ -705,9 +736,17 @@ static bool etm_init_iomem_access(struct etmv4_drvdata *drvdata, > static bool etm_init_csdev_access(struct etmv4_drvdata *drvdata, > struct csdev_access *csa) > { > + /* > + * Always choose the memory mapped io, if there is > + * a memory map to prevent sysreg access on broken > + * systems. > + */ > if (drvdata->base) > return etm_init_iomem_access(drvdata, csa); > > + if (etm_init_sysreg_access(drvdata, csa)) > + return true; > + > return false; With the above: Reviewed-by: Mathieu Poirier > } > > -- > 2.24.1 > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel