Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp602291lqp; Thu, 21 Mar 2024 09:58:48 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWU/iEcMEw9xDqCVecT1deTOwCMPdnod4oAV4u1tRzvXqRFrGAlCSO84kCaD2GfFklaq0dKKhU1pew8rAciwiVrfRGJaS26IkEflqYpDw== X-Google-Smtp-Source: AGHT+IEQ9urK6MJPkTRBaI0CSrd0RPsinguNwNRWHyxgsCNWtxlUy6S4PHISp+mWnvOEFG48tM6z X-Received: by 2002:ac2:5f6d:0:b0:513:e031:739a with SMTP id c13-20020ac25f6d000000b00513e031739amr2345858lfc.22.1711040327926; Thu, 21 Mar 2024 09:58:47 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711040327; cv=pass; d=google.com; s=arc-20160816; b=sKP32Y4XAN6jGmbCuaVoVGJt0WWfozrDaRWBceneBHM66pjjwe/eTPfdLBmLHgrX+J bOwCvs1GKjW3RJemrBH6PDCCMKyQ26wJY7bp0QEoQTMTcvYaSe6yry7/EIPQS5JJUWG1 nIKTnOcXskRFLSTZ4Xkf4TTWMO0amWAqKq39wNDG9dQpg2pdoyRUOogixQsx513B3FLw qMZOVtIYJ8wcPo8CUtraygsSNvi5+lTUELGqENgKy/fLl1R9NKZdD2t2N3Ph55MPeta5 spTbeSeLFNbTQhsDwEtk/huisidg367jM+WIkrutGchTTSESKlZIT5AgTG9FAZ5MVAH0 Yqog== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=Kn2o1j1j+kyvm4E30AVq9elkzW26JAOb09qP8M3QDoE=; fh=knouHfhWmUABu+sT2q0nnGKUzC7/WRiZH1KSpGv7uFs=; b=ytgQs//nLL4kNJD+DVDO3oQWPmkSVqqvcIeq7h5VmM7cC1YC+yICy0i1rAr5ow2mY6 O0zHxWKPh6egGvsZ12YUGFr/EpGvYLhBnmLmBnZUGHhvRK1T27MzQrKVAkgTcvXEpO63 wCWu3ODURyZZbb0t54qzEIdP76N8+MrPm93fObiRsNW2AJycLStRJHXqpIC3IRQK1JDC U+uWLyzw/TWPYAUGa93aS7C7vI4KQeYAXA2SnCCHYGGnkzstT1kjVgndgJErguF3ZVfK VDSDuS6/bB8XM0x0iXAhR+DqfxRvHVKTuVzNjx7gVVClUtfmo/RH3jVADEn5m37fpVEn +Dhg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-110416-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110416-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id dc1-20020a170906c7c100b00a46abb19f4fsi86285ejb.494.2024.03.21.09.58.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 09:58:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-110416-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-110416-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110416-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 751471F22E0E for ; Thu, 21 Mar 2024 16:58:47 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C05D8137C3B; Thu, 21 Mar 2024 16:51:21 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F3558137C20 for ; Thu, 21 Mar 2024 16:51:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711039881; cv=none; b=Fx2eBIk2KAMvyAP+ZWlfnBYt/WX6pbtBlzZPe8Y04kYnonA64tezGiXDoXs+k0IqeFt9orvYLfd9gv14caV5rN5QnITuQvEMBj0K+Jf5EM4fTjdGIMI+Coy5A3ZrLHqQIi39TDFjyr912vPMMHTvNBq6dlT24QQcokStv7++nj4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711039881; c=relaxed/simple; bh=tVf8yAhrkX/TrWZEX/g7UP+QODGzySo0OkwWF2k2Ha0=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=kykJSRyqBwy5sAO0mYWJ2ZSgI13caA2yl6m2lLyfC2uscOszLDKFwYCMQzkXlYLgvhEGJBOpxPSym2MXT71fcINTvaLKYEG7dU9zZOzb1EB8APu+xdJ6eGSH/2Zri9IWh7PyR5m67LxcrEGTTarwJ3S/WUxJwL9uNUwFiqqybj8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 51FE81007; Thu, 21 Mar 2024 09:51:52 -0700 (PDT) Received: from merodach.members.linode.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1142D3F67D; Thu, 21 Mar 2024 09:51:14 -0700 (PDT) From: James Morse To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Babu Moger , James Morse , shameerali.kolothum.thodi@huawei.com, D Scott Phillips OS , carl@os.amperecomputing.com, lcherian@marvell.com, bobo.shaobowang@huawei.com, tan.shaopeng@fujitsu.com, baolin.wang@linux.alibaba.com, Jamie Iles , Xin Hao , peternewman@google.com, dfustini@baylibre.com, amitsinght@marvell.com, David Hildenbrand , Rex Nie , Dave Martin Subject: [PATCH v1 00/31] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl Date: Thu, 21 Mar 2024 16:50:35 +0000 Message-Id: <20240321165106.31602-1-james.morse@arm.com> X-Mailer: git-send-email 2.20.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Hello! This is the final series that allows other architectures to implement resctrl. The last patch just moves the code, and its a bit of a monster. I don't expect that to get merged as part of this series - we should wait for it to make less impact on other series. It's included here to show what gets moved, and that structures/function-prototypes have the right visibility. Otherwise this series renames functions and moves code around. With the exception of invalid configurations for the configurable-events, there should be no changes in behaviour caused by this series. The driving pattern is to make things like struct rdtgroup private to resctrl. Features like pseudo-lock aren't going to work on arm64, the ability to disable it at compile time is added. After this, I can start posting the MPAM driver to make use of resctrl on arm64. (What's MPAM? See the cover letter of the first series. [1]) This series is based on Linus' commit 23956900041d and can be retrieved from: https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v1 Sorry for the mid-merge window base, I'm away for a few weeks - this should rebase trivially onto rc1. As ever - bugs welcome, Thanks, James [1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/ James Morse (31): x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitors x86/resctrl: Add a helper to avoid reaching into the arch code resource list x86/resctrl: Move ctrlval string parsing policy away from the arch code x86/resctrl: Add helper for setting CPU default properties x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid() x86/resctrl: Export resctrl fs's init function x86/resctrl: Wrap resctrl_arch_find_domain() around rdt_find_domain() x86/resctrl: Move resctrl types to a separate header x86/resctrl: Add a resctrl helper to reset all the resources x86/resctrl: Move monitor init work to a resctrl init call x86/resctrl: Move monitor exit work to a restrl exit call x86/resctrl: Move max_{name,data}_width into resctrl code x86/resctrl: Stop using the for_each_*_rdt_resource() walkers x86/resctrl: Export the is_mbm_*_enabled() helpers to asm/resctrl.h x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers x86/resctrl: Move mbm_cfg_mask to struct rdt_resource x86/resctrl: Allow resctrl_arch_mon_event_config_write() to return an error x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions x86/resctrl: Allow an architecture to disable pseudo lock x86/resctrl: Make prefetch_disable_bits belong to the arch code x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr x86/resctrl: Move thread_throttle_mode_init() to be managed by resctrl x86/resctrl: Move get_config_index() to a header x86/resctrl: Claim get_domain_from_cpu() for resctrl x86/resctrl: Describe resctrl's bitmap size assumptions x86/resctrl: Rename resctrl_sched_in() to begin resctrl_arch_ x86/resctrl: Drop __init/__exit on assorted symbols fs/resctrl: Add boiler plate for external resctrl code x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl x86/resctrl: Move the resctrl filesystem code to /fs/resctrl MAINTAINERS | 2 + arch/Kconfig | 8 + arch/x86/Kconfig | 5 +- arch/x86/include/asm/resctrl.h | 45 +- arch/x86/kernel/cpu/resctrl/Makefile | 5 +- arch/x86/kernel/cpu/resctrl/core.c | 119 +- arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 506 +-- arch/x86/kernel/cpu/resctrl/internal.h | 433 +-- arch/x86/kernel/cpu/resctrl/monitor.c | 813 +---- arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1126 +----- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 3929 +------------------- arch/x86/kernel/process_32.c | 2 +- arch/x86/kernel/process_64.c | 2 +- fs/Kconfig | 1 + fs/Makefile | 1 + fs/resctrl/Kconfig | 23 + fs/resctrl/Makefile | 3 + fs/resctrl/ctrlmondata.c | 527 +++ fs/resctrl/internal.h | 340 ++ fs/resctrl/monitor.c | 843 +++++ fs/resctrl/psuedo_lock.c | 1122 ++++++ fs/resctrl/rdtgroup.c | 4013 +++++++++++++++++++++ include/linux/resctrl.h | 153 +- include/linux/resctrl_types.h | 98 + 24 files changed, 7244 insertions(+), 6875 deletions(-) create mode 100644 fs/resctrl/Kconfig create mode 100644 fs/resctrl/Makefile create mode 100644 fs/resctrl/ctrlmondata.c create mode 100644 fs/resctrl/internal.h create mode 100644 fs/resctrl/monitor.c create mode 100644 fs/resctrl/psuedo_lock.c create mode 100644 fs/resctrl/rdtgroup.c create mode 100644 include/linux/resctrl_types.h -- 2.39.2