Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp1369815pxb; Fri, 1 Oct 2021 09:12:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxcMPP0XZlm4BQt6hL+4kHzWp2PyejiK3PnJxghzJ3Krmp9H7H9fLfjknoZ1qIWsMRxGlTr X-Received: by 2002:a17:90b:4a90:: with SMTP id lp16mr1881589pjb.194.1633104760115; Fri, 01 Oct 2021 09:12:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633104760; cv=none; d=google.com; s=arc-20160816; b=JK76AgTjzkLKsvoenxZRdWWyI6wtmEzCeVeQrwiSaTjTLxJsUJ6kzTMLNhiZs66FY2 1CyE9SdBnMCRzs4BPZhZpNkN3MOSe508kynHnjsRhCQ64cq/WBtjcjhUuQVel4CzO/DP /I5UzFR7aoGl4YQg8Sa2/8heTpByoatWosI1oSnFNyERTX4B5FgVt4Ydj+3W2sDs6Usf 5+3yhrBOMp2YbGMuXZo5dLtyCqDv3zzbmeXA+GZmeUKadXMPod+GGcuXRvgNUb7Luk7f XARYIE9PC1LfUMGfllUdtOyxu7FbKzG/2iQqrcg6XvQqXRRRNbQPd5sNRK2cqgI7aH7Y rQRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=l4z/m751AXfsNOgY034rXT6v1ZS+6YTGCqIQIa391yE=; b=dQreqLzsDO8uR+/kcz4jCK4m08SFhzDguo5jzhBXm9gkjuN9uU6C79fHB1vXYiWcv8 54vrHWz/KIxWw1t6eh1fGqCoW4JSTLjTjvA6581cIV2x4xZO5U1lW2+3HvzkQImOtDEn nARzyc32PW2ooB6mzO+138D6EykMRZRpA4/Y777XZueEp/CPQTSajR+mwJ9THJ8Us09L y0ukc6nGVbgWcwjaV+nEJVzeBdxL85l2StXGlsvIRk971bMNDDzl7kF+eonWLrFWyizN dgvYF83f58YsP/YdxjSpNetxI2tY9Ac/ruD9h4Uf6QbgBC3G+TJogph+znCuuqkIs8fw GwlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m13si11434356pgu.567.2021.10.01.09.12.26; Fri, 01 Oct 2021 09:12:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355331AbhJAQGQ (ORCPT + 99 others); Fri, 1 Oct 2021 12:06:16 -0400 Received: from foss.arm.com ([217.140.110.172]:46876 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1355339AbhJAQGA (ORCPT ); Fri, 1 Oct 2021 12:06:00 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1C6BD101E; Fri, 1 Oct 2021 09:04:16 -0700 (PDT) Received: from merodach.members.linode.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1DFD33F766; Fri, 1 Oct 2021 09:04:14 -0700 (PDT) From: James Morse To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Babu Moger , James Morse , shameerali.kolothum.thodi@huawei.com, Jamie Iles , D Scott Phillips OS , lcherian@marvell.com, bobo.shaobowang@huawei.com, tan.shaopeng@fujitsu.com Subject: [PATCH v2 19/23] x86/resctrl: Move mbm_overflow_count() into resctrl_arch_rmid_read() Date: Fri, 1 Oct 2021 16:02:58 +0000 Message-Id: <20211001160302.31189-20-james.morse@arm.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20211001160302.31189-1-james.morse@arm.com> References: <20211001160302.31189-1-james.morse@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org resctrl_arch_rmid_read() is intended as the function that an architecture agnostic resctrl filesystem driver can use to read a value in bytes from a counter. Currently the function returns the mbm values in chunks directly from hardware. When reading a bandwidth counter, mbm_overflow_count() must be used to correct for any possible overflow. mbm_overflow_count() is architecture specific, its behaviour should be part of resctrl_arch_rmid_read(). Move the mbm_overflow_count() calls into resctrl_arch_rmid_read(). This allows the resctrl filesystems's prev_msr to be removed in favour of the architecture private version. Signed-off-by: James Morse --- arch/x86/kernel/cpu/resctrl/internal.h | 2 -- arch/x86/kernel/cpu/resctrl/monitor.c | 35 +++++++++++++++----------- 2 files changed, 20 insertions(+), 17 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/internal.h b/arch/x86/kernel/cpu/resctrl/internal.h index eca7793d3342..2d0a6bba4a01 100644 --- a/arch/x86/kernel/cpu/resctrl/internal.h +++ b/arch/x86/kernel/cpu/resctrl/internal.h @@ -280,7 +280,6 @@ struct rftype { /** * struct mbm_state - status for each MBM counter in each domain * @chunks: Total data moved (multiply by rdt_group.mon_scale to get bytes) - * @prev_msr: Value of IA32_QM_CTR for this RMID last time we read it * @prev_bw_chunks: Previous chunks value read when for bandwidth calculation * @prev_bw: The most recent bandwidth in MBps * @delta_bw: Difference between the current and previous bandwidth @@ -288,7 +287,6 @@ struct rftype { */ struct mbm_state { u64 chunks; - u64 prev_msr; u64 prev_bw_chunks; u32 prev_bw; u32 delta_bw; diff --git a/arch/x86/kernel/cpu/resctrl/monitor.c b/arch/x86/kernel/cpu/resctrl/monitor.c index f833bc01aeac..4e8bb86ce4a5 100644 --- a/arch/x86/kernel/cpu/resctrl/monitor.c +++ b/arch/x86/kernel/cpu/resctrl/monitor.c @@ -167,9 +167,20 @@ void resctrl_arch_reset_rmid(struct rdt_resource *r, struct rdt_domain *d, memset(am, 0, sizeof(*am)); } +static u64 mbm_overflow_count(u64 prev_msr, u64 cur_msr, unsigned int width) +{ + u64 shift = 64 - width, chunks; + + chunks = (cur_msr << shift) - (prev_msr << shift); + return chunks >>= shift; +} + int resctrl_arch_rmid_read(struct rdt_resource *r, struct rdt_domain *d, u32 rmid, enum resctrl_event_id eventid, u64 *val) { + struct rdt_hw_resource *hw_res = resctrl_to_arch_res(r); + struct rdt_hw_domain *hw_dom = resctrl_to_arch_dom(d); + struct arch_mbm_state *am; u64 msr_val; if (!cpumask_test_cpu(smp_processor_id(), &d->cpu_mask)) @@ -191,7 +202,13 @@ int resctrl_arch_rmid_read(struct rdt_resource *r, struct rdt_domain *d, if (msr_val & RMID_VAL_UNAVAIL) return -EINVAL; - *val = msr_val; + am = get_arch_mbm_state(hw_dom, rmid, eventid); + if (am) { + *val = mbm_overflow_count(am->prev_msr, msr_val, hw_res->mbm_width); + am->prev_msr = msr_val; + } else { + *val = msr_val; + } return 0; } @@ -322,19 +339,10 @@ void free_rmid(u32 rmid) list_add_tail(&entry->list, &rmid_free_lru); } -static u64 mbm_overflow_count(u64 prev_msr, u64 cur_msr, unsigned int width) -{ - u64 shift = 64 - width, chunks; - - chunks = (cur_msr << shift) - (prev_msr << shift); - return chunks >>= shift; -} - static u64 __mon_event_count(u32 rmid, struct rmid_read *rr) { - struct rdt_hw_resource *hw_res = resctrl_to_arch_res(rr->r); struct mbm_state *m; - u64 chunks, tval = 0; + u64 tval = 0; if (rr->first) resctrl_arch_reset_rmid(rr->r, rr->d, rmid, rr->evtid); @@ -363,13 +371,10 @@ static u64 __mon_event_count(u32 rmid, struct rmid_read *rr) if (rr->first) { memset(m, 0, sizeof(struct mbm_state)); - m->prev_msr = tval; return 0; } - chunks = mbm_overflow_count(m->prev_msr, tval, hw_res->mbm_width); - m->chunks += chunks; - m->prev_msr = tval; + m->chunks += tval; rr->val += get_corrected_mbm_count(rmid, m->chunks); -- 2.30.2