Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp38655rdg; Tue, 10 Oct 2023 03:43:35 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGA0bjaTqHuNE3VuGW8HYx6j+yCHPntiVeKjnL8apVHeH9qW0fkV9mdVa//fMpjq4IhyYjO X-Received: by 2002:a17:90b:384a:b0:27c:ecf6:efe0 with SMTP id nl10-20020a17090b384a00b0027cecf6efe0mr988077pjb.47.1696934614984; Tue, 10 Oct 2023 03:43:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696934614; cv=none; d=google.com; s=arc-20160816; b=Y7PyAy89yDD2oFHWk6KBwSa3+qEa81TNOAUidJZjd1BkMknE5U1nvW0DSSh+9Z47su 4KQ2ZsF0R0FZk9kESaG+yCjYsw+G+qtn8sd1Fk6/or13dQFT04+FSNnOILI4Sx9yqtc4 G4yoOlADNxugmzLrwnb7+FUedC5o9KN7ehilyqQVHakL8sLLg+GdQmpUopJyRrNMnM0g CfJAIA34HD1fGINp575zA3s78NP9WdGr5FcR4XUf9VcD65YyZlFWgFl7st3+sZl3wdoS zxnWk1dGXds6TVnMm29UkaLG/jmmUaetf80GBcmCj2x9+mTDwoCtXPezLnPMyXlOpbj8 e9fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=3n06j6i/U9SzCAdNvomIzKOZsL4VEv5o7c6MRrWwiWs=; fh=/xaEWW9ZHpZ646oyGDk2W8f0ad1BtXK5S5oK3tS3Fj4=; b=CgDmjFfFaOWTWfQhHxEvvyfVn5o0/iotHiuDK6y+8pidZ0LMLlhHs5znAAv5qm/LBM hrg5ghqeWmZSY67qq0FE3MVozJk2yOqL4p7RDo680F7sHkty8Fq4VUBvz7/zrryJU/yf YA9xSzTyC99YR69g2jGEqim0Y0f1cd8BD7u8QGomZWFEsWgxzpRKF/tjuxgqKlotmP7w NVS0heYhtMnbJV4EGBFuQGR6faOosGf28a8+AvKThQd61Z8YqD4WTG4UCGaNKUwDxemL wcsqCTwL7CXgBf2nOPSEoEFuESflzPxPGqPY1H7qkNT0YwPwh2SrKMXSuWrXg6ZgJBA0 iuCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GB8Iu5Wd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id ng9-20020a17090b1a8900b002791a73ab07si12859372pjb.54.2023.10.10.03.43.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 03:43:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GB8Iu5Wd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 7B5D9801E6A5; Tue, 10 Oct 2023 03:43:32 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231158AbjJJKnV (ORCPT + 99 others); Tue, 10 Oct 2023 06:43:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40564 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231240AbjJJKnU (ORCPT ); Tue, 10 Oct 2023 06:43:20 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.20]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 878E5B0 for ; Tue, 10 Oct 2023 03:43:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1696934598; x=1728470598; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Fkf2vnJ011XvoTZEQnRzZwZfKwZBdFJaFwa9rlFTm4Q=; b=GB8Iu5WdUg/jIlH6JiHBMqIl2FLPcxaOdgIqWN/nwrS6sMtO7xroEde+ 9OssCLEg+jQ/UIcoQ0Agdf8zCMjujKbuhAyUL/RAcD386arR1NNKwXtDs Vn++8OeojskWl60ZfXRasylAO0OX8eN2jqdu49BI+lFzlLPuueiMwc84l 6ZEz+3XS5eKgcoalDNHN64+bI1R5JUtVfgY0ta4wZjUg6CtIov9lSSoIW LmPQukYSpFHW+pezMqLhEZtSLIHVKxX7FFlyU50+RvbIH6S/fwTc7Wysd WCkivfw5skXxzQOt5jOsEshcmmSkIgJNX7Irkpf5JRswxDeHIDTdd/dE3 w==; X-IronPort-AV: E=McAfee;i="6600,9927,10858"; a="374703505" X-IronPort-AV: E=Sophos;i="6.03,212,1694761200"; d="scan'208";a="374703505" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 03:43:17 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10858"; a="747033005" X-IronPort-AV: E=Sophos;i="6.03,212,1694761200"; d="scan'208";a="747033005" Received: from asalaman-mobl.ger.corp.intel.com (HELO wieczorr-mobl1.intel.com) ([10.213.16.145]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 03:43:12 -0700 From: Maciej Wieczor-Retman To: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" Cc: ilpo.jarvinen@linux.intel.com, Peter Newman , Babu Moger , linux-kernel@vger.kernel.org Subject: [PATCH v5 2/4] x86/resctrl: Enable non-contiguous CBMs in Intel CAT Date: Tue, 10 Oct 2023 12:42:37 +0200 Message-ID: <1849b487256fe4de40b30f88450cba3d9abc9171.1696934091.git.maciej.wieczor-retman@intel.com> X-Mailer: git-send-email 2.42.0 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 10 Oct 2023 03:43:32 -0700 (PDT) X-Spam-Level: ** The setting for non-contiguous 1s support in Intel CAT is hardcoded to false. On these systems, writing non-contiguous 1s into the schemata file will fail before resctrl passes the value to the hardware. In Intel CAT CPUID.0x10.1:ECX[3] and CPUID.0x10.2:ECX[3] stopped being reserved and now carry information about non-contiguous 1s value support for L3 and L2 cache respectively. The CAT capacity bitmask (CBM) supports a non-contiguous 1s value if the bit is set. The exception are Haswell systems where non-contiguous 1s value support needs to stay disabled since they can't make use of CPUID for Cache allocation. Originally-by: Fenghua Yu Signed-off-by: Maciej Wieczor-Retman Tested-by: Peter Newman Reviewed-by: Ilpo Järvinen Reviewed-by: Peter Newman Reviewed-by: Reinette Chatre Reviewed-by: Babu Moger --- Changelog v5: - Add Babu's reviewed-by tag. - Rephrase the patch message to avoid redundancy with the patch content. Changelog v4: - Add Ilpo's reviewed-by tag. - Add Reinette's reviewed-by tag. Changelog v3: - Add Peter's tested-by and reviewed-by tags. - Change patch subject to mention CBMs. (Babu) Changelog v2: - Rewrite part of a comment concerning Haswell. (Reinette) arch/x86/kernel/cpu/resctrl/core.c | 9 ++++++--- arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 10 ++++++---- arch/x86/kernel/cpu/resctrl/internal.h | 9 +++++++++ 3 files changed, 21 insertions(+), 7 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/core.c b/arch/x86/kernel/cpu/resctrl/core.c index c09e4fdded3c..19e0681f0435 100644 --- a/arch/x86/kernel/cpu/resctrl/core.c +++ b/arch/x86/kernel/cpu/resctrl/core.c @@ -152,6 +152,7 @@ static inline void cache_alloc_hsw_probe(void) r->cache.cbm_len = 20; r->cache.shareable_bits = 0xc0000; r->cache.min_cbm_bits = 2; + r->cache.arch_has_sparse_bitmasks = false; r->alloc_capable = true; rdt_alloc_capable = true; @@ -267,15 +268,18 @@ static void rdt_get_cache_alloc_cfg(int idx, struct rdt_resource *r) { struct rdt_hw_resource *hw_res = resctrl_to_arch_res(r); union cpuid_0x10_1_eax eax; + union cpuid_0x10_x_ecx ecx; union cpuid_0x10_x_edx edx; - u32 ebx, ecx; + u32 ebx; - cpuid_count(0x00000010, idx, &eax.full, &ebx, &ecx, &edx.full); + cpuid_count(0x00000010, idx, &eax.full, &ebx, &ecx.full, &edx.full); hw_res->num_closid = edx.split.cos_max + 1; r->cache.cbm_len = eax.split.cbm_len + 1; r->default_ctrl = BIT_MASK(eax.split.cbm_len + 1) - 1; r->cache.shareable_bits = ebx & r->default_ctrl; r->data_width = (r->cache.cbm_len + 3) / 4; + if (boot_cpu_data.x86_vendor == X86_VENDOR_INTEL) + r->cache.arch_has_sparse_bitmasks = ecx.split.noncont; r->alloc_capable = true; } @@ -872,7 +876,6 @@ static __init void rdt_init_res_defs_intel(void) if (r->rid == RDT_RESOURCE_L3 || r->rid == RDT_RESOURCE_L2) { - r->cache.arch_has_sparse_bitmasks = false; r->cache.arch_has_per_cpu_cfg = false; r->cache.min_cbm_bits = 1; } else if (r->rid == RDT_RESOURCE_MBA) { diff --git a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c index ab45012288bb..beccb0e87ba7 100644 --- a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c +++ b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c @@ -87,10 +87,12 @@ int parse_bw(struct rdt_parse_data *data, struct resctrl_schema *s, /* * Check whether a cache bit mask is valid. - * For Intel the SDM says: - * Please note that all (and only) contiguous '1' combinations - * are allowed (e.g. FFFFH, 0FF0H, 003CH, etc.). - * Additionally Haswell requires at least two bits set. + * On Intel CPUs, non-contiguous 1s value support is indicated by CPUID: + * - CPUID.0x10.1:ECX[3]: L3 non-contiguous 1s value supported if 1 + * - CPUID.0x10.2:ECX[3]: L2 non-contiguous 1s value supported if 1 + * + * Haswell does not support a non-contiguous 1s value and additionally + * requires at least two bits set. * AMD allows non-contiguous bitmasks. */ static bool cbm_validate(char *buf, u32 *data, struct rdt_resource *r) diff --git a/arch/x86/kernel/cpu/resctrl/internal.h b/arch/x86/kernel/cpu/resctrl/internal.h index 85ceaf9a31ac..c47ef2f13e8e 100644 --- a/arch/x86/kernel/cpu/resctrl/internal.h +++ b/arch/x86/kernel/cpu/resctrl/internal.h @@ -492,6 +492,15 @@ union cpuid_0x10_3_eax { unsigned int full; }; +/* CPUID.(EAX=10H, ECX=ResID).ECX */ +union cpuid_0x10_x_ecx { + struct { + unsigned int reserved:3; + unsigned int noncont:1; + } split; + unsigned int full; +}; + /* CPUID.(EAX=10H, ECX=ResID).EDX */ union cpuid_0x10_x_edx { struct { -- 2.42.0