Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1580181pxp; Sun, 20 Mar 2022 23:16:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoOmb+ajmjcpzCmdKr6jCr/1OCA9qoTPzBRegK+Jqq7tHZASOvGjjslckYSwRoTAp9Nb01 X-Received: by 2002:a17:906:5a85:b0:6df:85e1:1855 with SMTP id l5-20020a1709065a8500b006df85e11855mr19261448ejq.451.1647843370488; Sun, 20 Mar 2022 23:16:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647843370; cv=none; d=google.com; s=arc-20160816; b=KloxAgXEPkoDkwkpVYp0FKbcvoKm22Ns/ixc6CfwqZELCt5Ejr+NvF6cFJZD+2OuC0 kKZqzrYumsXvBb+3QlyfsHnR+XtvOlSfr+WY4X+Oci2n2YogIIHSEJqBr7OIAYkMkIyM fJjV/O7GyihOS0KvxrZFSBKnooVODJmi+EDfSX5boAtH/Mm5SkP4w85+ErBm8iBCohA3 iSR88gl1WuCkZo6DRzYMuPtihT2apVXehouphd4XGWKsQecrsgUu2fvy7/TQC3YnHWQO r6myyPhMvchPFiL2I3WHiTfV5IFWyUOH2VS1JmAlc/7grp74GWW8+xrytns0imdOMzG2 bHhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=JL/f1CSJeaPQiQsGY99he87/u6/xycFygg5yqRhqJ6g=; b=cQUgNJ3S0oX0VipUcSQJ6MXLfS8IpsZ2KuBw+oblSWPGE4OAM8rUiTTMnQswOkzKT1 JzLXwmtSzM/YB1bZqwn4C2HPFcVd5Lq4//0dy1W8/m/A+tPA+FEzjCn53iqDXdwd5sst KibowtSSpuDkGCvSbwzAHNgsMH1uWv7rvt24RXn/JNvewC1B1dgsQmOiRFplPN7bWd9j 5IFE6wuOHqQpS3QCmlKfc5KlGX1BC2PkKL5cldutip7s/56cQSEoSrQnW4LBdCotkzTx XxaTGWQQa6s6knglPbPUmjNb3G0ZfAxEnwig24/wdW+qVfNnQuyKV2mi99ZSYBFmYDK0 4FPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=GpI9q9GH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d5-20020a50e405000000b00418e70517e6si9311798edm.67.2022.03.20.23.15.45; Sun, 20 Mar 2022 23:16:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=GpI9q9GH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241362AbiCRWpX (ORCPT + 99 others); Fri, 18 Mar 2022 18:45:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56606 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241344AbiCRWpP (ORCPT ); Fri, 18 Mar 2022 18:45:15 -0400 Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4F1CF19B054; Fri, 18 Mar 2022 15:43:53 -0700 (PDT) Received: from pps.filterd (m0150241.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 22IM2b9b002693; Fri, 18 Mar 2022 22:43:13 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=pps0720; bh=JL/f1CSJeaPQiQsGY99he87/u6/xycFygg5yqRhqJ6g=; b=GpI9q9GHS0KHE4DJqcktaArsGDFXVf1GMnaIVeNy07btOIHKeGYYbnsPrceZHp8iviLK oht+vqAfolh4suIyK7zC148ETwpzEJCF7WrEPZvi7ye6kulAlQzEjxk0ZZnZmHwnhVRJ iyDV2xtW5iswP0BsscHL0t4TsmpColAxRc6c2NnuFbu1XDe4/cevK6IMWp3ePxB5TDbh YVfjcQKWeaxdtJFQtJTNaajnd7KmU9ZzOfIMdwkAsiVU4XdjYld+YV4Rb46upn2mbFMO ZsNZTStKcvHhwUWmM2vrGY+uks4uUVYt6ea2aicOj3bNXAZ2Vief7Tcq0BB7VKu8AOWw ZA== Received: from g4t3426.houston.hpe.com (g4t3426.houston.hpe.com [15.241.140.75]) by mx0a-002e3701.pphosted.com (PPS) with ESMTPS id 3ew0sprt2b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Mar 2022 22:43:13 +0000 Received: from g4t3433.houston.hpecorp.net (g4t3433.houston.hpecorp.net [16.208.49.245]) by g4t3426.houston.hpe.com (Postfix) with ESMTP id 350C24E; Fri, 18 Mar 2022 22:43:11 +0000 (UTC) Received: from dog.eag.rdlabs.hpecorp.net (dog.eag.rdlabs.hpecorp.net [128.162.243.181]) by g4t3433.houston.hpecorp.net (Postfix) with ESMTP id C2A5946; Fri, 18 Mar 2022 22:43:10 +0000 (UTC) From: Mike Travis To: Borislav Petkov , Ingo Molnar , Thomas Gleixner , Steve Wahl , x86@kernel.org Cc: Mike Travis , Andy Shevchenko , Darren Hart , Dimitri Sivanich , "H. Peter Anvin" , Russ Anderson , linux-kernel@vger.kernel.org, platform-driver-x86@vger.kernel.org Subject: [PATCH v3 0/3] x86/platform/uv: UV Kernel support for UV5 Date: Fri, 18 Mar 2022 17:43:01 -0500 Message-Id: <20220318224304.174967-1-mike.travis@hpe.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-ORIG-GUID: d1t7hvYBtPIIGCctp3KEzSlvn6_7KQ4g X-Proofpoint-GUID: d1t7hvYBtPIIGCctp3KEzSlvn6_7KQ4g X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.850,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-03-18_14,2022-03-15_01,2022-02-23_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 suspectscore=0 lowpriorityscore=0 mlxlogscore=567 impostorscore=0 priorityscore=1501 clxscore=1015 adultscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203180122 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org v2: Delete patch to remove SCRATCH 5 NMI support check mainly for UV2 and UV3k systems with old NMI support function. v3: Fix check BIOS NMI support mistake in Patch 1. Update NMI setup for UV5 Update NMI handler to interface with UV5 hardware. This involves changing the EVENT_OCCURRED MMR used by the hardware and removes the check for which NMI function is supported by UV BIOS. The newer NMI function is assumed supported on UV5 and above. Update TSC sync check for UV5 Update TSC to not check TSC sync state for uv5+ as it is not available. It is assumed that TSC will always be in sync for multiple chassis and will pass the tests for the kernel to accept it as the clocksource. To disable this check use the kernel start options tsc=reliable clocksource=tsc. Log gap hole end size Show value of gap end in the kernel log which equates to number of physical address bits used by system. The end address of the gap holds PA bits 56:26 which gives the range up to 64PB max size with 64MB of granularity. Mike Travis (3): x86/platform/uv: Update NMI Handler for UV5 x86/platform/uv: Update TSC sync state for UV5 x86/platform/uv: Log gap hole end size arch/x86/kernel/apic/x2apic_uv_x.c | 20 +++++++++++++++----- arch/x86/platform/uv/uv_nmi.c | 21 +++++++++++---------- 2 files changed, 26 insertions(+), 15 deletions(-) -- 2.26.2