aboutsummaryrefslogtreecommitdiff
path: root/arch/arm64/include/asm
diff options
context:
space:
mode:
authorXiaogang Cui <xiaogang@codeaurora.org>2015-11-19 13:24:05 +0800
committerXiaogang Cui <xiaogang@codeaurora.org>2015-12-17 19:46:37 +0800
commit300ab09dc2b199c589800f93cf8aff2ddda0ce1c (patch)
tree546a0fb2030c3b8ae6096acbcadcabaaa09b37d8 /arch/arm64/include/asm
parent5d82f29d1b91946106ccc49fe7a6051e1eb83450 (diff)
coresight: add system instruction access to etm for AArch32
According to the ETMV4 spec. ETMV4 support two type of access operations, memeory mapped access and system instruction access. In some specified chipsets. The memory-mapped access may result in secure watchdog bite accross power collapse. Add system instruction access to ETMv4 for AArch32 to fix the compiling errors. Change-Id: I1ec69e70bf83359374700e579191fac755a3a64e Signed-off-by: Xiaogang Cui <xiaogang@codeaurora.org>
Diffstat (limited to 'arch/arm64/include/asm')
-rw-r--r--arch/arm64/include/asm/etmv4x.h4
1 files changed, 4 insertions, 0 deletions
diff --git a/arch/arm64/include/asm/etmv4x.h b/arch/arm64/include/asm/etmv4x.h
index 1faccbe1f867..014aa5572543 100644
--- a/arch/arm64/include/asm/etmv4x.h
+++ b/arch/arm64/include/asm/etmv4x.h
@@ -41,6 +41,10 @@ val; \
asm volatile("msr S"#op0"_"#op1"_"#crn"_"#crm"_"#op2", %0" : : "r" (val)); \
})
+/* Clock and Power Management Register */
+#define RSYSL_CPMR_EL1() MRSL(3, 7, c15, c0, 5)
+#define WSYS_CPMR_EL1(val) MSR(val, 3, 7, c15, c0, 5)
+
/*
* ETMv4 Registers
*