Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp1406916pxx; Fri, 30 Oct 2020 09:14:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHbYa94wejCgfGA4kkGVHBh3Xzhcyhe3lM3wE7lCyPgIgAYANuzcJwPMe0cfd65yO3n4PQ X-Received: by 2002:a17:906:934d:: with SMTP id p13mr3119863ejw.245.1604074498991; Fri, 30 Oct 2020 09:14:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604074498; cv=none; d=google.com; s=arc-20160816; b=yaAR1KN8VVJBwbpf6Ywmv+v3H4mLEKtG05/daxceIX7Mh6nGpe4cemkhhtPmpLU7my 3K1An/nTAANgDVPvGK21EWOoGzdp3rJoMBMSkMzYaJSwMWmunwxFEZaUWqLyK59O39vw Nl18H8VB0qXftGXWoXYdWA9qHYuaXvKWdhFZejYeayOj49YgCzqpVEI1U7U7KEtVGZTj jzJcY5/qsMZkQIVvZWH1QcyHvKyqWuJkD4gKfxQh55Dlz0rkg0xzRzna7bSYtQBkbNnj UBLf0uYQk4EcFAyg1V/rhPUtz6zlkk5l4YxBAc2nEd9Uh1nZjyeAjhDNIiXhc0/voNmj lUxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=aR5a2mklzHSuwyDbXMvxHrm0JyUb0WclPJ5jpr9XH64=; b=Khmdgrn0NHfIlru738C+lb/yfN9/wXxmtsCFEHnorAb+MWPo/K+6Uo6oastawRmQT+ CNU9dWB59YSEQ+mm1XCst8qareyxPqL94yJJIuCu0n/2fy8GJx4tIsy4uNUfVny7SVrT 6/iJ+m9uIxjyKZpvq27LHb5twJdQsLICWLhZDRiRsijoKIlrSWp+LuIgPaNLWgbL4e5n g6ttCzPoq0NxGommIJWBL1aqkwRLxmI7oMrVnbzwmmoH10T5u7RMjjFyT0HRgf7VnnbP oOV9q45fCscO7/WJPX1lYWJPOexnhHEWxHjz6KDKTJ9XV+BVKsscIZ7EIF1kFuMcoygA gTLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 19si4948101ejy.97.2020.10.30.09.14.34; Fri, 30 Oct 2020 09:14:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727084AbgJ3QMl (ORCPT + 99 others); Fri, 30 Oct 2020 12:12:41 -0400 Received: from foss.arm.com ([217.140.110.172]:38998 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727057AbgJ3QMj (ORCPT ); Fri, 30 Oct 2020 12:12:39 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 89BF41655; Fri, 30 Oct 2020 09:12:38 -0700 (PDT) Received: from eglon.eretz (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C105A3F719; Fri, 30 Oct 2020 09:12:36 -0700 (PDT) From: James Morse To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , shameerali.kolothum.thodi@huawei.com, Jamie Iles , D Scott Phillips OS , James Morse Subject: [PATCH 09/24] x86/resctrl: Change rdt_resource to resctrl_schema in pseudo_lock_region Date: Fri, 30 Oct 2020 16:11:05 +0000 Message-Id: <20201030161120.227225-10-james.morse@arm.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201030161120.227225-1-james.morse@arm.com> References: <20201030161120.227225-1-james.morse@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org struct pseudo_lock_region points to the rdt_resource. Once the resources are merged, this won't be unique. The resource name is moving into the schema, so that eventually resctrl can generate it. Change pseudo_lock_region's rdt_resource pointer for a schema pointer. Signed-off-by: James Morse --- arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 4 ++-- arch/x86/kernel/cpu/resctrl/internal.h | 6 +++--- arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 8 ++++---- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4 ++-- 4 files changed, 11 insertions(+), 11 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c index d3f9d142f58a..a65ff53394ed 100644 --- a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c +++ b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c @@ -228,7 +228,7 @@ static int parse_line(char *line, struct resctrl_schema *s, * the required initialization for single * region and return. */ - rdtgrp->plr->r = r; + rdtgrp->plr->s = s; rdtgrp->plr->d = d; rdtgrp->plr->cbm = d->new_ctrl; d->plr = rdtgrp->plr; @@ -429,7 +429,7 @@ int rdtgroup_schemata_show(struct kernfs_open_file *of, ret = -ENODEV; } else { seq_printf(s, "%s:%d=%x\n", - rdtgrp->plr->r->name, + rdtgrp->plr->s->res->name, rdtgrp->plr->d->id, rdtgrp->plr->cbm); } diff --git a/arch/x86/kernel/cpu/resctrl/internal.h b/arch/x86/kernel/cpu/resctrl/internal.h index 1e1f2493a87f..27671a654f8b 100644 --- a/arch/x86/kernel/cpu/resctrl/internal.h +++ b/arch/x86/kernel/cpu/resctrl/internal.h @@ -158,8 +158,8 @@ struct mongroup { /** * struct pseudo_lock_region - pseudo-lock region information - * @r: RDT resource to which this pseudo-locked region - * belongs + * @s: Resctrl schema for the resource to which this + * pseudo-locked region belongs * @d: RDT domain to which this pseudo-locked region * belongs * @cbm: bitmask of the pseudo-locked region @@ -179,7 +179,7 @@ struct mongroup { * @pm_reqs: Power management QoS requests related to this region */ struct pseudo_lock_region { - struct rdt_resource *r; + struct resctrl_schema *s; struct rdt_domain *d; u32 cbm; wait_queue_head_t lock_thread_wq; diff --git a/arch/x86/kernel/cpu/resctrl/pseudo_lock.c b/arch/x86/kernel/cpu/resctrl/pseudo_lock.c index d58f2ffa65e0..d9d9861f244f 100644 --- a/arch/x86/kernel/cpu/resctrl/pseudo_lock.c +++ b/arch/x86/kernel/cpu/resctrl/pseudo_lock.c @@ -246,7 +246,7 @@ static void pseudo_lock_region_clear(struct pseudo_lock_region *plr) plr->line_size = 0; kfree(plr->kmem); plr->kmem = NULL; - plr->r = NULL; + plr->s = NULL; if (plr->d) plr->d->plr = NULL; plr->d = NULL; @@ -290,10 +290,10 @@ static int pseudo_lock_region_init(struct pseudo_lock_region *plr) ci = get_cpu_cacheinfo(plr->cpu); - plr->size = rdtgroup_cbm_to_size(plr->r, plr->d, plr->cbm); + plr->size = rdtgroup_cbm_to_size(plr->s->res, plr->d, plr->cbm); for (i = 0; i < ci->num_leaves; i++) { - if (ci->info_list[i].level == plr->r->cache_level) { + if (ci->info_list[i].level == plr->s->res->cache_level) { plr->line_size = ci->info_list[i].coherency_line_size; return 0; } @@ -796,7 +796,7 @@ bool rdtgroup_cbm_overlaps_pseudo_locked(struct rdt_domain *d, unsigned long cbm unsigned long cbm_b; if (d->plr) { - cbm_len = d->plr->r->cache.cbm_len; + cbm_len = d->plr->s->res->cache.cbm_len; cbm_b = d->plr->cbm; if (bitmap_intersects(&cbm, &cbm_b, cbm_len)) return true; diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index 592a517afd6a..311a3890bc53 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -1441,8 +1441,8 @@ static int rdtgroup_size_show(struct kernfs_open_file *of, ret = -ENODEV; } else { seq_printf(s, "%*s:", max_name_width, - rdtgrp->plr->r->name); - size = rdtgroup_cbm_to_size(rdtgrp->plr->r, + rdtgrp->plr->s->res->name); + size = rdtgroup_cbm_to_size(rdtgrp->plr->s->res, rdtgrp->plr->d, rdtgrp->plr->cbm); seq_printf(s, "%d=%u\n", rdtgrp->plr->d->id, size); -- 2.28.0