Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3140612rwb; Fri, 2 Dec 2022 23:05:10 -0800 (PST) X-Google-Smtp-Source: AA0mqf4dTyVw8pWOWyzmBaNBqWIPQlfElI9GxAj8SxWBK5dRXJ7lCSg4p2DApg/4vVPPPWtEoKtD X-Received: by 2002:a63:f301:0:b0:45f:88b2:1762 with SMTP id l1-20020a63f301000000b0045f88b21762mr64227496pgh.341.1670051110153; Fri, 02 Dec 2022 23:05:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670051110; cv=none; d=google.com; s=arc-20160816; b=sHr7xjhp+Z1GfcGYQBcPln5IvjUcV09jUt1C4beSiPadxcRiJbcKEOa93MfMj7t4sH x77IO2h6dXDVA+U2y279q5eXmr4JvWvOH/ACcCjUZK+NOzUBlN4W8JkzAlg1A9+CikSe 9HECZK7QxFrYmWi2SsmM1nKB6+i/KK0FemmUJaTSzxmdmxpkK57Vnq0DEZxPN5fSfigQ zshYdINbrL4Krahjmh3D0ztaKFu/0gPPpp/znTz38OxMp0hV4g5SovjoDL8y/DHYpKPz XzNBPzZ2x5RzVexRm5uRWpa86vIm8g8CkcSe8EtOyOSi7zx2c1aLfwRIM0z+6hMmPlD6 6JnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=8+D6mfTqwfey0lLy9Lc3RpfTXi+1JUYYl3NRmY/n6Cg=; b=ysnEBpHVJtVeUGoZtvE7j/SCIXWv6PuIcjoHXvlp6EnhOHPtqeTk+xUKh0kYJgDEN0 LPT+alqMaqMPq9omyORYuYlAs23tfS8HtFlMqIZ7WCOW67/cF1TrTELpWUbPdfAGWya/ m3WMebxANvKD+zzi7YMF102D5d9j2L7iUVu5aQ5NjSmxvRIy1rib/GqfC58yW4Gkile4 WtV1XKqrUv3bmqg3Wuuv92tVAzH5IXUDcHKAcW/1Em+I3b8HoYVR+XWGLaBXItQsYa8/ X164QBi2FsqcDWii1LorJXVamABI1Lhii61iIML3nrMMCICif6FCa7NA/zApDUUHkIbQ ScdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=O1HUEM1k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q13-20020a170902f78d00b00186f9d4400esi9140472pln.346.2022.12.02.23.04.58; Fri, 02 Dec 2022 23:05:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=O1HUEM1k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231594AbiLCGsA (ORCPT + 83 others); Sat, 3 Dec 2022 01:48:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35250 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231657AbiLCGrj (ORCPT ); Sat, 3 Dec 2022 01:47:39 -0500 Received: from mail-pj1-x102a.google.com (mail-pj1-x102a.google.com [IPv6:2607:f8b0:4864:20::102a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9E04FB9562 for ; Fri, 2 Dec 2022 22:47:26 -0800 (PST) Received: by mail-pj1-x102a.google.com with SMTP id l22-20020a17090a3f1600b00212fbbcfb78so10257467pjc.3 for ; Fri, 02 Dec 2022 22:47:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8+D6mfTqwfey0lLy9Lc3RpfTXi+1JUYYl3NRmY/n6Cg=; b=O1HUEM1kuxlKgxDRZksTgkWxBmPSc8Nvnep6Fo8qupSeofGZxZUQZdS8cTjKMT/FB/ /6w/3YB0RPnYvp+juqh71xwtrmU59lnIqNM+yI9s8p4QBfPcTiyKSNtgFvehf3aSag3T B1tOvPMsZih20BjojFJO/eAZn1wsgQ05BiwtQk3ypqOv6ViBTAU+7OcD0/ndsTTcabYo heP4OgXUBec8BfIe/9OMRANYtA3Hckw989gW1Bt94m1AlPzNYWFIL2J3BlfLZIC6fE+O d36vn8TnQ448DpYT+ooFjEH/shzIJNtuqtbIB/ORunx8GrtpTbz+0l3suOxftXeq2V/S 29xg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8+D6mfTqwfey0lLy9Lc3RpfTXi+1JUYYl3NRmY/n6Cg=; b=68UoR6XMybcR1Gm9MzwJOZM4dfGkbgTk+Ug6taIv9aHfMFAFe7hsBUCnTsXXsaBUb4 FF3Y7HzXrfq95arq7mryv4BRBnhSQzDEdubbiZhEvQdazG7Qe9sUssJCMjUwYv4aNOiK 8GSYJ52k15b6tpoZcwFxE90Riepg11HMQ3hNW06DoyrNePYC4smfAntR40vWuv/H2T9V 7H21+alA0twddKDRipODA//7S7PRty2O2ebr/W6pdlTGK1QOBRXDexpZvysz4kTd9pMY VzwAgE8VhIcHYGWwH78A8d4WunsrRT1J9TSPrIgQeDJDutx9Vlr5Mtv1Z1jMJXMi+g5A Ebjg== X-Gm-Message-State: ANoB5pk40ov7BZvufYxqVrzMW8QosGOpc05SFXuiVuYTIZ7bSwEsEv8R dkzddetZtGFPNYrGbs2p0wI16g== X-Received: by 2002:a17:90b:2541:b0:213:30c4:e803 with SMTP id nw1-20020a17090b254100b0021330c4e803mr83420155pjb.209.1670050045998; Fri, 02 Dec 2022 22:47:25 -0800 (PST) Received: from anup-ubuntu-vm.localdomain ([103.97.165.210]) by smtp.gmail.com with ESMTPSA id t17-20020aa79471000000b00575c8242849sm6102091pfq.69.2022.12.02.22.47.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 02 Dec 2022 22:47:25 -0800 (PST) From: Anup Patel To: Palmer Dabbelt , Paul Walmsley , Thomas Gleixner , Marc Zyngier , Daniel Lezcano Cc: Hector Martin , Sven Peter , Alyssa Rosenzweig , Atish Patra , Alistair Francis , Anup Patel , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, asahi@lists.linux.dev, Anup Patel , Atish Patra Subject: [PATCH v15 7/9] RISC-V: Use IPIs for remote icache flush when possible Date: Sat, 3 Dec 2022 12:16:27 +0530 Message-Id: <20221203064629.1601299-8-apatel@ventanamicro.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221203064629.1601299-1-apatel@ventanamicro.com> References: <20221203064629.1601299-1-apatel@ventanamicro.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If we have specialized interrupt controller (such as AIA IMSIC) which allows supervisor mode to directly inject IPIs without any assistance from M-mode or HS-mode then using such specialized interrupt controller, we can do remote icache flushe directly from supervisor mode instead of using the SBI RFENCE calls. This patch extends remote icache flush functions to use supervisor mode IPIs whenever direct supervisor mode IPIs.are supported by interrupt controller. Signed-off-by: Anup Patel Reviewed-by: Atish Patra --- arch/riscv/mm/cacheflush.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/riscv/mm/cacheflush.c b/arch/riscv/mm/cacheflush.c index 57b40a350420..f10cb47eac3a 100644 --- a/arch/riscv/mm/cacheflush.c +++ b/arch/riscv/mm/cacheflush.c @@ -19,7 +19,7 @@ void flush_icache_all(void) { local_flush_icache_all(); - if (IS_ENABLED(CONFIG_RISCV_SBI)) + if (IS_ENABLED(CONFIG_RISCV_SBI) && !riscv_use_ipi_for_rfence()) sbi_remote_fence_i(NULL); else on_each_cpu(ipi_remote_fence_i, NULL, 1); @@ -67,7 +67,8 @@ void flush_icache_mm(struct mm_struct *mm, bool local) * with flush_icache_deferred(). */ smp_mb(); - } else if (IS_ENABLED(CONFIG_RISCV_SBI)) { + } else if (IS_ENABLED(CONFIG_RISCV_SBI) && + !riscv_use_ipi_for_rfence()) { sbi_remote_fence_i(&others); } else { on_each_cpu_mask(&others, ipi_remote_fence_i, NULL, 1); -- 2.34.1