linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Mike Leach <mike.leach@linaro.org>
To: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Coresight ML <coresight@lists.linaro.org>,
	linux-arm-kernel <linux-arm-kernel@lists.infradead.org>,
	"Suzuki K. Poulose" <suzuki.poulose@arm.com>
Subject: Re: [PATCH 1/8] coresight: etm4x: Fixes for ETM v4.4 architecture updates.
Date: Tue, 27 Aug 2019 11:12:51 +0100	[thread overview]
Message-ID: <CAJ9a7Vj90=m+m+NhBW7d=nYMH6SP47BpF968F9Q5z6g3WjrEvw@mail.gmail.com> (raw)
In-Reply-To: <20190826214713.GA24690@xps15>

Hi Mathieu,

On Mon, 26 Aug 2019 at 22:47, Mathieu Poirier
<mathieu.poirier@linaro.org> wrote:
>
> Hi Mike,
>
>
> On Mon, Aug 19, 2019 at 09:57:13PM +0100, Mike Leach wrote:
> > ETMv4.4 adds in support for tracing secure EL2 (per arch 8.x updates).
>
> What is the name of the ETMv4.4 document?  I can only find up to 4.2 on line.
>

Arm® Embedded Trace Macrocell
Architecture Specification
ETMv4.0 to ETMv4.4

ARM IHI0064F

Published 2018 - non-confidential.

So should be available.

> > Patch accounts for this new capability.
> >
> > Signed-off-by: Mike Leach <mike.leach@linaro.org>
> > ---
> >  .../hwtracing/coresight/coresight-etm4x-sysfs.c   | 12 ++++++------
> >  drivers/hwtracing/coresight/coresight-etm4x.c     |  5 ++++-
> >  drivers/hwtracing/coresight/coresight-etm4x.h     | 15 +++++++++++----
> >  3 files changed, 21 insertions(+), 11 deletions(-)
> >
> > diff --git a/drivers/hwtracing/coresight/coresight-etm4x-sysfs.c b/drivers/hwtracing/coresight/coresight-etm4x-sysfs.c
> > index 219c10eb752c..b6984be0c515 100644
> > --- a/drivers/hwtracing/coresight/coresight-etm4x-sysfs.c
> > +++ b/drivers/hwtracing/coresight/coresight-etm4x-sysfs.c
> > @@ -738,7 +738,7 @@ static ssize_t s_exlevel_vinst_show(struct device *dev,
> >       struct etmv4_drvdata *drvdata = dev_get_drvdata(dev->parent);
> >       struct etmv4_config *config = &drvdata->config;
> >
> > -     val = BMVAL(config->vinst_ctrl, 16, 19);
> > +     val = (config->vinst_ctrl & ETM_EXLEVEL_S_VICTLR_MASK) >> 16;
> >       return scnprintf(buf, PAGE_SIZE, "%#lx\n", val);
> >  }
> >
> > @@ -754,8 +754,8 @@ static ssize_t s_exlevel_vinst_store(struct device *dev,
> >               return -EINVAL;
> >
> >       spin_lock(&drvdata->spinlock);
> > -     /* clear all EXLEVEL_S bits (bit[18] is never implemented) */
> > -     config->vinst_ctrl &= ~(BIT(16) | BIT(17) | BIT(19));
> > +     /* clear all EXLEVEL_S bits  */
> > +     config->vinst_ctrl &= ~(ETM_EXLEVEL_S_VICTLR_MASK);
> >       /* enable instruction tracing for corresponding exception level */
> >       val &= drvdata->s_ex_level;
> >       config->vinst_ctrl |= (val << 16);
> > @@ -773,7 +773,7 @@ static ssize_t ns_exlevel_vinst_show(struct device *dev,
> >       struct etmv4_config *config = &drvdata->config;
> >
> >       /* EXLEVEL_NS, bits[23:20] */
> > -     val = BMVAL(config->vinst_ctrl, 20, 23);
> > +     val = (config->vinst_ctrl & ETM_EXLEVEL_NS_VICTLR_MASK) >> 20;
> >       return scnprintf(buf, PAGE_SIZE, "%#lx\n", val);
> >  }
> >
> > @@ -789,8 +789,8 @@ static ssize_t ns_exlevel_vinst_store(struct device *dev,
> >               return -EINVAL;
> >
> >       spin_lock(&drvdata->spinlock);
> > -     /* clear EXLEVEL_NS bits (bit[23] is never implemented */
> > -     config->vinst_ctrl &= ~(BIT(20) | BIT(21) | BIT(22));
> > +     /* clear EXLEVEL_NS bits  */
> > +     config->vinst_ctrl &= ~(ETM_EXLEVEL_NS_VICTLR_MASK);
> >       /* enable instruction tracing for corresponding exception level */
> >       val &= drvdata->ns_ex_level;
> >       config->vinst_ctrl |= (val << 20);
> > diff --git a/drivers/hwtracing/coresight/coresight-etm4x.c b/drivers/hwtracing/coresight/coresight-etm4x.c
> > index a128b5063f46..52b8876de157 100644
> > --- a/drivers/hwtracing/coresight/coresight-etm4x.c
> > +++ b/drivers/hwtracing/coresight/coresight-etm4x.c
> > @@ -629,6 +629,7 @@ static void etm4_init_arch_data(void *info)
> >        * TRCARCHMAJ, bits[11:8] architecture major versin number
> >        */
> >       drvdata->arch = BMVAL(etmidr1, 4, 11);
> > +     drvdata->config.arch = drvdata->arch;
> >
> >       /* maximum size of resources */
> >       etmidr2 = readl_relaxed(drvdata->base + TRCIDR2);
> > @@ -780,6 +781,7 @@ static u64 etm4_get_ns_access_type(struct etmv4_config *config)
> >  static u64 etm4_get_access_type(struct etmv4_config *config)
> >  {
> >       u64 access_type = etm4_get_ns_access_type(config);
> > +     u64 s_hyp = (config->arch & 0x0f) >= 0x4 ? ETM_EXLEVEL_S_HYP : 0;
> >
> >       /*
> >        * EXLEVEL_S, bits[11:8], don't trace anything happening
> > @@ -787,7 +789,8 @@ static u64 etm4_get_access_type(struct etmv4_config *config)
> >        */
> >       access_type |= (ETM_EXLEVEL_S_APP       |
> >                       ETM_EXLEVEL_S_OS        |
> > -                     ETM_EXLEVEL_S_HYP);
> > +                     s_hyp                   |
> > +                     ETM_EXLEVEL_S_MON);
> >
> >       return access_type;
> >  }
> > diff --git a/drivers/hwtracing/coresight/coresight-etm4x.h b/drivers/hwtracing/coresight/coresight-etm4x.h
> > index 4523f10ddd0f..60bc2fb5159b 100644
> > --- a/drivers/hwtracing/coresight/coresight-etm4x.h
> > +++ b/drivers/hwtracing/coresight/coresight-etm4x.h
> > @@ -180,17 +180,22 @@
> >  /* PowerDown Control Register bits */
> >  #define TRCPDCR_PU                   BIT(3)
> >
> > -/* secure state access levels */
> > +/* secure state access levels - TRCACATRn */
> >  #define ETM_EXLEVEL_S_APP            BIT(8)
> >  #define ETM_EXLEVEL_S_OS             BIT(9)
> > -#define ETM_EXLEVEL_S_NA             BIT(10)
> > -#define ETM_EXLEVEL_S_HYP            BIT(11)
> > -/* non-secure state access levels */
> > +#define ETM_EXLEVEL_S_HYP            BIT(10)
> > +#define ETM_EXLEVEL_S_MON            BIT(11)
> > +/* non-secure state access levels - TRCACATRn */
> >  #define ETM_EXLEVEL_NS_APP           BIT(12)
> >  #define ETM_EXLEVEL_NS_OS            BIT(13)
> >  #define ETM_EXLEVEL_NS_HYP           BIT(14)
> >  #define ETM_EXLEVEL_NS_NA            BIT(15)
> >
> > +/* secure / non secure masks - TRCVICTLR, IDR3 */
> > +#define ETM_EXLEVEL_S_VICTLR_MASK    GENMASK(19, 16)
> > +/* NS MON (EL3) mode never implemented */
> > +#define ETM_EXLEVEL_NS_VICTLR_MASK   GENMASK(22, 20)
>
> It is hard to say without documentation but shouldn't this be GENMASK(23, 20)?
>
Per the comment above, EL3_NS is prohibited so the mask refers to only
the 3 allow bits (NS EL0 - EL2).

> > +
> >  /**
> >   * struct etmv4_config - configuration information related to an ETMv4
> >   * @mode:    Controls various modes supported by this ETM.
> > @@ -237,6 +242,7 @@
> >   * @vmid_mask0:      VM ID comparator mask for comparator 0-3.
> >   * @vmid_mask1:      VM ID comparator mask for comparator 4-7.
> >   * @ext_inp: External input selection.
> > + * @arch:    ETM architecture version (for arch dependent config).
> >   */
> >  struct etmv4_config {
> >       u32                             mode;
> > @@ -279,6 +285,7 @@ struct etmv4_config {
> >       u32                             vmid_mask0;
> >       u32                             vmid_mask1;
> >       u32                             ext_inp;
> > +     u8                              arch;
> >  };
> >
> >  /**
> > --
> > 2.17.1
> >



-- 
Mike Leach
Principal Engineer, ARM Ltd.
Manchester Design Centre. UK

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2019-08-27 10:13 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-08-19 20:57 [PATCH 0/8] coresight: etm4x: Fixes and updates for sysfs API Mike Leach
2019-08-19 20:57 ` [PATCH 1/8] coresight: etm4x: Fixes for ETM v4.4 architecture updates Mike Leach
2019-08-26 21:47   ` Mathieu Poirier
2019-08-27 10:12     ` Mike Leach [this message]
2019-08-27 19:19       ` Mathieu Poirier
2019-08-28  1:52   ` Leo Yan
2019-08-19 20:57 ` [PATCH 2/8] coresight: etm4x: Fix input validation for sysfs Mike Leach
2019-08-26 22:29   ` Mathieu Poirier
2019-08-28  2:42   ` Leo Yan
2019-08-19 20:57 ` [PATCH 3/8] coresight: etm4x: Add missing API to set EL match on address filters Mike Leach
2019-08-26 22:59   ` Mathieu Poirier
2019-08-27 10:55     ` Mike Leach
2019-08-27 17:57       ` Mathieu Poirier
2019-08-28  2:53   ` Leo Yan
2019-08-28 12:10     ` Mike Leach
2019-08-19 20:57 ` [PATCH 4/8] coresight: etm4x: Fix issues with start-stop logic Mike Leach
2019-08-28  3:17   ` Leo Yan
2019-08-28 12:40     ` Mike Leach
2019-08-19 20:57 ` [PATCH 5/8] coresight: etm4x: Improve usability of sysfs API Mike Leach
2019-08-27 21:35   ` Mathieu Poirier
2019-08-28  3:36   ` Leo Yan
2019-08-28 12:56     ` Mike Leach
2019-08-19 20:57 ` [PATCH 6/8] coresight: etm4x: Add view comparator settings API to sysfs Mike Leach
2019-08-27 21:40   ` Mathieu Poirier
2019-08-28  4:00   ` Leo Yan
2019-08-19 20:57 ` [PATCH 7/8] coresight: etm4x: Add missing single-shot control " Mike Leach
2019-08-27 22:27   ` Mathieu Poirier
2019-08-28 14:15     ` Mike Leach
2019-08-28  5:18   ` Leo Yan
2019-08-28 14:15     ` Mike Leach
2019-08-19 20:57 ` [PATCH 8/8] coresight: etm4x: docs: Additional documentation for ETM4x Mike Leach
2019-08-27 22:32   ` Mathieu Poirier
2019-08-27 22:34   ` Mathieu Poirier
2019-08-28 14:20     ` Mike Leach
2019-08-28 16:36       ` Mathieu Poirier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAJ9a7Vj90=m+m+NhBW7d=nYMH6SP47BpF968F9Q5z6g3WjrEvw@mail.gmail.com' \
    --to=mike.leach@linaro.org \
    --cc=coresight@lists.linaro.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=mathieu.poirier@linaro.org \
    --cc=suzuki.poulose@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).