Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3800169imm; Tue, 29 May 2018 14:02:22 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIOZSp2rmZONupMPPoyQ1ns+Np4nHX8FkezNyhI0Qubn0IMl1/A1GxzyLbgKlkG9D9Bzdp9 X-Received: by 2002:a17:902:b409:: with SMTP id x9-v6mr34910plr.180.1527627742091; Tue, 29 May 2018 14:02:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527627742; cv=none; d=google.com; s=arc-20160816; b=q7qpmtJG10p6SspaXBHDuSkpapEJKPMSNL+/V+B/8bwNN4GMv6u1oIl7Y64JpO1Vg3 DJQQpfjr6f6MzPTs0GLBAIF4F64GfH8HIt2CP6+Qpw0/HC1mIoW0bv3QYo94IwNsgqNW 6p80aABHUZQJS96HPdmIRrqcLDBg9geWTNG7ImC1O6Mju6bgBGWNhxyC5PpQs8dJqRH2 kABxEzEUzVDxaeW2MjKwqp0DP0sRiNZmiAA3azD21dOD2f2UMBAZLLbrcOQgFumw62PW tnisGjlL9ipIcY9fdKmqH8yFwyDms5q2Lx439jj4kQlEO/ewAH3gVMRpalP3E2jYA+Xt RJ+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=C25aPMVPEGH9l3vlu6ZfHCDc6l0D5q+6tS2O9dyKT+k=; b=cG5Y/cZni8oWjrhAR7zVTunFvmy7AZq5tFGJBclgwOWF8cp5ojiq7OCj25RHwig6VL JwjjgWlNMYjMJJYxUhX1TbINvPUrz6l0j1gg94HAK9fbxZ9nT0YJRywt6YgoAUAX1SgD clRkql2sqXSxGAJNMCTSr44yYS7Rqeu9l8uSut9DoW5HbjILCU8j5jUu52Hoq8uqs/vH d3nhe4tWhnTsGUQeK0D1ZFJuvmbsLTZ19EC8MmM91/19zyH4eeDcqNX7L2bR6TElKeSB 50hRYSgdR2Excuzx9mPc1xXxUdBNRNtMLTDxRk3wxtEePaNqcEB9H+j9O/L5Ry8UeDw6 jxFw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12-v6si14423906plq.595.2018.05.29.14.02.07; Tue, 29 May 2018 14:02:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966900AbeE2VBR (ORCPT + 99 others); Tue, 29 May 2018 17:01:17 -0400 Received: from mga14.intel.com ([192.55.52.115]:46446 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S937158AbeE2VBD (ORCPT ); Tue, 29 May 2018 17:01:03 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 May 2018 14:00:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,457,1520924400"; d="scan'208";a="60127750" Received: from rchatre-s.jf.intel.com ([10.54.70.76]) by orsmga001.jf.intel.com with ESMTP; 29 May 2018 14:00:55 -0700 From: Reinette Chatre To: tglx@linutronix.de, fenghua.yu@intel.com, tony.luck@intel.com, vikas.shivappa@linux.intel.com Cc: gavin.hindman@intel.com, jithu.joseph@intel.com, dave.hansen@intel.com, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, Reinette Chatre Subject: [PATCH V5 27/38] x86/intel_rdt: Add utilities to test pseudo-locked region possibility Date: Tue, 29 May 2018 05:57:52 -0700 Message-Id: <3a7d6cc8dee86c3fbcc3bd8988b4dc80b44582fa.1527593971.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A pseudo-locked region does not have a class of service associated with it and thus not tracked in the array of control values maintained as part of the domain. Even so, when the user provides a new bitmask for another resource group it needs to be checked for interference with existing pseudo-locked regions. Additionally only one pseudo-locked region can be created in any cache hierarchy. Introduce two utilities in support of above scenarios: (1) a utility that can be used to test if a given capacity bitmask overlaps with any pseudo-locked regions associated with a particular cache instance, (2) a utility that can be used to test if a pseudo-locked region exists within a particular cache hierarchy. Signed-off-by: Reinette Chatre --- arch/x86/kernel/cpu/intel_rdt.h | 2 ++ arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c | 55 +++++++++++++++++++++++++++++ 2 files changed, 57 insertions(+) diff --git a/arch/x86/kernel/cpu/intel_rdt.h b/arch/x86/kernel/cpu/intel_rdt.h index 12b006178d3a..119645c83e27 100644 --- a/arch/x86/kernel/cpu/intel_rdt.h +++ b/arch/x86/kernel/cpu/intel_rdt.h @@ -503,6 +503,8 @@ enum rdtgrp_mode rdtgroup_mode_by_closid(int closid); int rdtgroup_tasks_assigned(struct rdtgroup *r); int rdtgroup_locksetup_enter(struct rdtgroup *rdtgrp); int rdtgroup_locksetup_exit(struct rdtgroup *rdtgrp); +bool rdtgroup_cbm_overlaps_pseudo_locked(struct rdt_domain *d, u32 _cbm); +bool rdtgroup_pseudo_locked_in_hierarchy(struct rdt_domain *d); struct rdt_domain *get_domain_from_cpu(int cpu, struct rdt_resource *r); int update_domains(struct rdt_resource *r, int closid); void closid_free(int closid); diff --git a/arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c b/arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c index ce8243c87877..0d2177a0bc60 100644 --- a/arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c +++ b/arch/x86/kernel/cpu/intel_rdt_pseudo_lock.c @@ -299,3 +299,58 @@ int rdtgroup_locksetup_exit(struct rdtgroup *rdtgrp) pseudo_lock_free(rdtgrp); return 0; } + +/** + * rdtgroup_cbm_overlaps_pseudo_locked - Test if CBM or portion is pseudo-locked + * @d: RDT domain + * @_cbm: CBM to test + * + * @d represents a cache instance and @_cbm a capacity bitmask that is + * considered for it. Determine if @_cbm overlaps with any existing + * pseudo-locked region on @d. + * + * Return: true if @_cbm overlaps with pseudo-locked region on @d, false + * otherwise. + */ +bool rdtgroup_cbm_overlaps_pseudo_locked(struct rdt_domain *d, u32 _cbm) +{ + unsigned long *cbm = (unsigned long *)&_cbm; + unsigned long *cbm_b; + unsigned int cbm_len; + + if (d->plr) { + cbm_len = d->plr->r->cache.cbm_len; + cbm_b = (unsigned long *)&d->plr->cbm; + if (bitmap_intersects(cbm, cbm_b, cbm_len)) + return true; + } + + return false; +} + +/** + * rdtgroup_pseudo_locked_in_hierarchy - Pseudo-locked region in cache hierarchy + * @d: RDT domain under test + * + * The setup of a pseudo-locked region affects all cache instances within + * the hierarchy of the region. It is thus essential to know if any + * pseudo-locked regions exist within a cache hierarchy to prevent any + * attempts to create new pseudo-locked regions in the same hierarchy. + * + * Return: true if a pseudo-locked region exists in the hierarchy of @d, + * false otherwise. + */ +bool rdtgroup_pseudo_locked_in_hierarchy(struct rdt_domain *d) +{ + struct rdt_resource *r; + struct rdt_domain *d_i; + + for_each_alloc_enabled_rdt_resource(r) { + list_for_each_entry(d_i, &r->domains, list) { + if (d_i != d && + cpumask_intersects(&d_i->cpu_mask, &d->cpu_mask)) + return true; + } + } + return false; +} -- 2.13.6