2019-05-27 09:55:05 +03:00
// SPDX-License-Identifier: GPL-2.0-or-later
2005-04-17 02:20:36 +04:00
/*
* pSeries_lpar . c
* Copyright ( C ) 2001 Todd Inglett , IBM Corporation
*
* pSeries LPAR support .
*/
2008-04-24 09:13:19 +04:00
/* Enables debugging of low-level hash table routines - careful! */
# undef DEBUG
2018-06-29 11:39:04 +03:00
# define pr_fmt(fmt) "lpar: " fmt
2005-04-17 02:20:36 +04:00
# include <linux/kernel.h>
# include <linux/dma-mapping.h>
2005-11-23 09:56:06 +03:00
# include <linux/console.h>
2011-05-27 18:46:24 +04:00
# include <linux/export.h>
2015-04-09 06:51:32 +03:00
# include <linux/jump_label.h>
2016-12-09 03:07:36 +03:00
# include <linux/delay.h>
# include <linux/stop_machine.h>
2019-07-03 20:04:00 +03:00
# include <linux/spinlock.h>
# include <linux/cpuhotplug.h>
# include <linux/workqueue.h>
# include <linux/proc_fs.h>
2020-06-09 07:32:42 +03:00
# include <linux/pgtable.h>
2021-08-12 16:28:31 +03:00
# include <linux/debugfs.h>
2005-04-17 02:20:36 +04:00
# include <asm/processor.h>
# include <asm/mmu.h>
# include <asm/page.h>
# include <asm/machdep.h>
# include <asm/mmu_context.h>
# include <asm/iommu.h>
# include <asm/tlb.h>
# include <asm/prom.h>
# include <asm/cputable.h>
2005-11-07 01:49:43 +03:00
# include <asm/udbg.h>
2005-11-07 05:18:13 +03:00
# include <asm/smp.h>
2009-10-26 21:50:29 +03:00
# include <asm/trace.h>
2012-03-15 22:18:00 +04:00
# include <asm/firmware.h>
2013-08-22 13:53:52 +04:00
# include <asm/plpar_wrappers.h>
2014-12-18 21:06:55 +03:00
# include <asm/kexec.h>
2014-10-01 11:02:30 +04:00
# include <asm/fadump.h>
2016-05-18 04:16:50 +03:00
# include <asm/asm-prototypes.h>
2020-05-29 23:41:01 +03:00
# include <asm/dtl.h>
2005-11-03 07:33:31 +03:00
2008-04-16 07:51:48 +04:00
# include "pseries.h"
2005-04-17 02:20:36 +04:00
2013-06-20 13:00:27 +04:00
/* Flag bits for H_BULK_REMOVE */
# define HBR_REQUEST 0x4000000000000000UL
# define HBR_RESPONSE 0x8000000000000000UL
# define HBR_END 0xc000000000000000UL
# define HBR_AVPN 0x0200000000000000UL
# define HBR_ANDCOND 0x0100000000000000UL
2005-04-17 02:20:36 +04:00
2006-07-19 02:01:28 +04:00
/* in hvCall.S */
2005-04-17 02:20:36 +04:00
EXPORT_SYMBOL ( plpar_hcall ) ;
2006-07-19 02:01:28 +04:00
EXPORT_SYMBOL ( plpar_hcall9 ) ;
2005-04-17 02:20:36 +04:00
EXPORT_SYMBOL ( plpar_hcall_norets ) ;
2006-07-19 02:01:28 +04:00
2019-09-20 16:05:22 +03:00
/*
* H_BLOCK_REMOVE supported block size for this page size in segment who ' s base
* page size is that page size .
*
* The first index is the segment base page size , the second one is the actual
* page size .
*/
static int hblkrm_size [ MMU_PAGE_COUNT ] [ MMU_PAGE_COUNT ] __ro_after_init ;
powerpc/pseries: Call H_BLOCK_REMOVE when supported
Depending on the hardware and the hypervisor, the hcall H_BLOCK_REMOVE
may not be able to process all the page sizes for a segment base page
size, as reported by the TLB Invalidate Characteristics.
For each pair of base segment page size and actual page size, this
characteristic tells us the size of the block the hcall supports.
In the case, the hcall is not supporting a pair of base segment page
size, actual page size, it is returning H_PARAM which leads to a panic
like this:
kernel BUG at /home/srikar/work/linux.git/arch/powerpc/platforms/pseries/lpar.c:466!
Oops: Exception in kernel mode, sig: 5 [#1]
BE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
CPU: 28 PID: 583 Comm: modprobe Not tainted 5.2.0-master #5
NIP: c0000000000be8dc LR: c0000000000be880 CTR: 0000000000000000
REGS: c0000007e77fb130 TRAP: 0700 Not tainted (5.2.0-master)
MSR: 8000000000029032 <SF,EE,ME,IR,DR,RI> CR: 42224824 XER: 20000000
CFAR: c0000000000be8fc IRQMASK: 0
GPR00: 0000000022224828 c0000007e77fb3c0 c000000001434d00 0000000000000005
GPR04: 9000000004fa8c00 0000000000000000 0000000000000003 0000000000000001
GPR08: c0000007e77fb450 0000000000000000 0000000000000001 ffffffffffffffff
GPR12: c0000007e77fb450 c00000000edfcb80 0000cd7d3ea30000 c0000000016022b0
GPR16: 00000000000000b0 0000cd7d3ea30000 0000000000000001 c080001f04f00105
GPR20: 0000000000000003 0000000000000004 c000000fbeb05f58 c000000001602200
GPR24: 0000000000000000 0000000000000004 8800000000000000 c000000000c5d148
GPR28: c000000000000000 8000000000000000 a000000000000000 c0000007e77fb580
NIP [c0000000000be8dc] .call_block_remove+0x12c/0x220
LR [c0000000000be880] .call_block_remove+0xd0/0x220
Call Trace:
0xc000000fb8c00240 (unreliable)
.pSeries_lpar_flush_hash_range+0x578/0x670
.flush_hash_range+0x44/0x100
.__flush_tlb_pending+0x3c/0xc0
.zap_pte_range+0x7ec/0x830
.unmap_page_range+0x3f4/0x540
.unmap_vmas+0x94/0x120
.exit_mmap+0xac/0x1f0
.mmput+0x9c/0x1f0
.do_exit+0x388/0xd60
.do_group_exit+0x54/0x100
.__se_sys_exit_group+0x14/0x20
system_call+0x5c/0x70
Instruction dump:
39400001 38a00000 4800003c 60000000 60420000 7fa9e800 38e00000 419e0014
7d29d278 7d290074 7929d182 69270001 <0b070000> 7d495378 394a0001 7fa93040
The call to H_BLOCK_REMOVE should only be made for the supported pair
of base segment page size, actual page size and using the correct
maximum block size.
Due to the required complexity in do_block_remove() and
call_block_remove(), and the fact that currently a block size of 8 is
returned by the hypervisor, we are only supporting 8 size block to the
H_BLOCK_REMOVE hcall.
In order to identify this limitation easily in the code, a local
define HBLKR_SUPPORTED_SIZE defining the currently supported block
size, and a dedicated checking helper is_supported_hlbkr() are
introduced.
For regular pages and hugetlb, the assumption is made that the page
size is equal to the base page size. For THP the page size is assumed
to be 16M.
Fixes: ba2dd8a26baa ("powerpc/pseries/mm: call H_BLOCK_REMOVE")
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190920130523.20441-3-ldufour@linux.ibm.com
2019-09-20 16:05:23 +03:00
/*
* Due to the involved complexity , and that the current hypervisor is only
* returning this value or 0 , we are limiting the support of the H_BLOCK_REMOVE
* buffer size to 8 size block .
*/
# define HBLKRM_SUPPORTED_BLOCK_SIZE 8
2019-07-03 20:04:00 +03:00
# ifdef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
static u8 dtl_mask = DTL_LOG_PREEMPT ;
# else
static u8 dtl_mask ;
# endif
2019-07-03 20:04:01 +03:00
void alloc_dtl_buffers ( unsigned long * time_limit )
2019-07-03 20:03:56 +03:00
{
int cpu ;
struct paca_struct * pp ;
struct dtl_entry * dtl ;
for_each_possible_cpu ( cpu ) {
pp = paca_ptrs [ cpu ] ;
2019-07-03 20:04:00 +03:00
if ( pp - > dispatch_log )
continue ;
2019-07-03 20:03:56 +03:00
dtl = kmem_cache_alloc ( dtl_cache , GFP_KERNEL ) ;
if ( ! dtl ) {
pr_warn ( " Failed to allocate dispatch trace log for cpu %d \n " ,
cpu ) ;
2019-07-03 20:04:00 +03:00
# ifdef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
2019-07-03 20:03:56 +03:00
pr_warn ( " Stolen time statistics will be unreliable \n " ) ;
2019-07-03 20:04:00 +03:00
# endif
2019-07-03 20:03:56 +03:00
break ;
}
pp - > dtl_ridx = 0 ;
pp - > dispatch_log = dtl ;
pp - > dispatch_log_end = dtl + N_DISPATCH_LOG ;
pp - > dtl_curr = dtl ;
2019-07-03 20:04:01 +03:00
if ( time_limit & & time_after ( jiffies , * time_limit ) ) {
cond_resched ( ) ;
* time_limit = jiffies + HZ ;
}
2019-07-03 20:03:56 +03:00
}
}
void register_dtl_buffer ( int cpu )
{
long ret ;
struct paca_struct * pp ;
struct dtl_entry * dtl ;
int hwcpu = get_hard_smp_processor_id ( cpu ) ;
pp = paca_ptrs [ cpu ] ;
dtl = pp - > dispatch_log ;
2019-07-03 20:04:00 +03:00
if ( dtl & & dtl_mask ) {
2019-07-03 20:03:56 +03:00
pp - > dtl_ridx = 0 ;
pp - > dtl_curr = dtl ;
lppaca_of ( cpu ) . dtl_idx = 0 ;
/* hypervisor reads buffer length from this field */
dtl - > enqueue_to_dispatch_time = cpu_to_be32 ( DISPATCH_LOG_BYTES ) ;
ret = register_dtl ( hwcpu , __pa ( dtl ) ) ;
if ( ret )
pr_err ( " WARNING: DTL registration of cpu %d (hw %d) failed with %ld \n " ,
cpu , hwcpu , ret ) ;
2019-07-03 20:04:00 +03:00
lppaca_of ( cpu ) . dtl_enable_mask = dtl_mask ;
2019-07-03 20:03:56 +03:00
}
}
2019-07-03 20:03:57 +03:00
# ifdef CONFIG_PPC_SPLPAR
2019-07-03 20:04:00 +03:00
struct dtl_worker {
struct delayed_work work ;
int cpu ;
} ;
struct vcpu_dispatch_data {
int last_disp_cpu ;
int total_disp ;
int same_cpu_disp ;
int same_chip_disp ;
int diff_chip_disp ;
int far_chip_disp ;
int numa_home_disp ;
int numa_remote_disp ;
int numa_far_disp ;
} ;
/*
* This represents the number of cpus in the hypervisor . Since there is no
* architected way to discover the number of processors in the host , we
* provision for dealing with NR_CPUS . This is currently 2048 by default , and
* is sufficient for our purposes . This will need to be tweaked if
* CONFIG_NR_CPUS is changed .
*/
# define NR_CPUS_H NR_CPUS
2019-07-03 20:03:57 +03:00
DEFINE_RWLOCK ( dtl_access_lock ) ;
2019-07-03 20:04:00 +03:00
static DEFINE_PER_CPU ( struct vcpu_dispatch_data , vcpu_disp_data ) ;
static DEFINE_PER_CPU ( u64 , dtl_entry_ridx ) ;
static DEFINE_PER_CPU ( struct dtl_worker , dtl_workers ) ;
static enum cpuhp_state dtl_worker_state ;
static DEFINE_MUTEX ( dtl_enable_mutex ) ;
static int vcpudispatch_stats_on __read_mostly ;
static int vcpudispatch_stats_freq = 50 ;
static __be32 * vcpu_associativity , * pcpu_associativity ;
2019-07-03 20:04:01 +03:00
static void free_dtl_buffers ( unsigned long * time_limit )
2019-07-03 20:04:00 +03:00
{
# ifndef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
int cpu ;
struct paca_struct * pp ;
for_each_possible_cpu ( cpu ) {
pp = paca_ptrs [ cpu ] ;
if ( ! pp - > dispatch_log )
continue ;
kmem_cache_free ( dtl_cache , pp - > dispatch_log ) ;
pp - > dtl_ridx = 0 ;
pp - > dispatch_log = 0 ;
pp - > dispatch_log_end = 0 ;
pp - > dtl_curr = 0 ;
2019-07-03 20:04:01 +03:00
if ( time_limit & & time_after ( jiffies , * time_limit ) ) {
cond_resched ( ) ;
* time_limit = jiffies + HZ ;
}
2019-07-03 20:04:00 +03:00
}
# endif
}
static int init_cpu_associativity ( void )
{
vcpu_associativity = kcalloc ( num_possible_cpus ( ) / threads_per_core ,
VPHN_ASSOC_BUFSIZE * sizeof ( __be32 ) , GFP_KERNEL ) ;
pcpu_associativity = kcalloc ( NR_CPUS_H / threads_per_core ,
VPHN_ASSOC_BUFSIZE * sizeof ( __be32 ) , GFP_KERNEL ) ;
if ( ! vcpu_associativity | | ! pcpu_associativity ) {
pr_err ( " error allocating memory for associativity information \n " ) ;
return - ENOMEM ;
}
return 0 ;
}
static void destroy_cpu_associativity ( void )
{
kfree ( vcpu_associativity ) ;
kfree ( pcpu_associativity ) ;
vcpu_associativity = pcpu_associativity = 0 ;
}
static __be32 * __get_cpu_associativity ( int cpu , __be32 * cpu_assoc , int flag )
{
__be32 * assoc ;
int rc = 0 ;
assoc = & cpu_assoc [ ( int ) ( cpu / threads_per_core ) * VPHN_ASSOC_BUFSIZE ] ;
if ( ! assoc [ 0 ] ) {
rc = hcall_vphn ( cpu , flag , & assoc [ 0 ] ) ;
if ( rc )
return NULL ;
}
return assoc ;
}
static __be32 * get_pcpu_associativity ( int cpu )
{
return __get_cpu_associativity ( cpu , pcpu_associativity , VPHN_FLAG_PCPU ) ;
}
static __be32 * get_vcpu_associativity ( int cpu )
{
return __get_cpu_associativity ( cpu , vcpu_associativity , VPHN_FLAG_VCPU ) ;
}
static int cpu_relative_dispatch_distance ( int last_disp_cpu , int cur_disp_cpu )
{
__be32 * last_disp_cpu_assoc , * cur_disp_cpu_assoc ;
if ( last_disp_cpu > = NR_CPUS_H | | cur_disp_cpu > = NR_CPUS_H )
return - EINVAL ;
last_disp_cpu_assoc = get_pcpu_associativity ( last_disp_cpu ) ;
cur_disp_cpu_assoc = get_pcpu_associativity ( cur_disp_cpu ) ;
if ( ! last_disp_cpu_assoc | | ! cur_disp_cpu_assoc )
return - EIO ;
2021-08-12 16:22:22 +03:00
return cpu_relative_distance ( last_disp_cpu_assoc , cur_disp_cpu_assoc ) ;
2019-07-03 20:04:00 +03:00
}
static int cpu_home_node_dispatch_distance ( int disp_cpu )
{
__be32 * disp_cpu_assoc , * vcpu_assoc ;
int vcpu_id = smp_processor_id ( ) ;
if ( disp_cpu > = NR_CPUS_H ) {
pr_debug_ratelimited ( " vcpu dispatch cpu %d > %d \n " ,
disp_cpu , NR_CPUS_H ) ;
return - EINVAL ;
}
disp_cpu_assoc = get_pcpu_associativity ( disp_cpu ) ;
vcpu_assoc = get_vcpu_associativity ( vcpu_id ) ;
if ( ! disp_cpu_assoc | | ! vcpu_assoc )
return - EIO ;
2021-08-12 16:22:22 +03:00
return cpu_relative_distance ( disp_cpu_assoc , vcpu_assoc ) ;
2019-07-03 20:04:00 +03:00
}
static void update_vcpu_disp_stat ( int disp_cpu )
{
struct vcpu_dispatch_data * disp ;
int distance ;
disp = this_cpu_ptr ( & vcpu_disp_data ) ;
if ( disp - > last_disp_cpu = = - 1 ) {
disp - > last_disp_cpu = disp_cpu ;
return ;
}
disp - > total_disp + + ;
if ( disp - > last_disp_cpu = = disp_cpu | |
( cpu_first_thread_sibling ( disp - > last_disp_cpu ) = =
cpu_first_thread_sibling ( disp_cpu ) ) )
disp - > same_cpu_disp + + ;
else {
distance = cpu_relative_dispatch_distance ( disp - > last_disp_cpu ,
disp_cpu ) ;
if ( distance < 0 )
pr_debug_ratelimited ( " vcpudispatch_stats: cpu %d: error determining associativity \n " ,
smp_processor_id ( ) ) ;
else {
switch ( distance ) {
case 0 :
disp - > same_chip_disp + + ;
break ;
case 1 :
disp - > diff_chip_disp + + ;
break ;
case 2 :
disp - > far_chip_disp + + ;
break ;
default :
pr_debug_ratelimited ( " vcpudispatch_stats: cpu %d (%d -> %d): unexpected relative dispatch distance %d \n " ,
smp_processor_id ( ) ,
disp - > last_disp_cpu ,
disp_cpu ,
distance ) ;
}
}
}
distance = cpu_home_node_dispatch_distance ( disp_cpu ) ;
if ( distance < 0 )
pr_debug_ratelimited ( " vcpudispatch_stats: cpu %d: error determining associativity \n " ,
smp_processor_id ( ) ) ;
else {
switch ( distance ) {
case 0 :
disp - > numa_home_disp + + ;
break ;
case 1 :
disp - > numa_remote_disp + + ;
break ;
case 2 :
disp - > numa_far_disp + + ;
break ;
default :
pr_debug_ratelimited ( " vcpudispatch_stats: cpu %d on %d: unexpected numa dispatch distance %d \n " ,
smp_processor_id ( ) ,
disp_cpu ,
distance ) ;
}
}
disp - > last_disp_cpu = disp_cpu ;
}
static void process_dtl_buffer ( struct work_struct * work )
{
struct dtl_entry dtle ;
u64 i = __this_cpu_read ( dtl_entry_ridx ) ;
struct dtl_entry * dtl = local_paca - > dispatch_log + ( i % N_DISPATCH_LOG ) ;
struct dtl_entry * dtl_end = local_paca - > dispatch_log_end ;
struct lppaca * vpa = local_paca - > lppaca_ptr ;
struct dtl_worker * d = container_of ( work , struct dtl_worker , work . work ) ;
if ( ! local_paca - > dispatch_log )
return ;
/* if we have been migrated away, we cancel ourself */
if ( d - > cpu ! = smp_processor_id ( ) ) {
pr_debug ( " vcpudispatch_stats: cpu %d worker migrated -- canceling worker \n " ,
smp_processor_id ( ) ) ;
return ;
}
if ( i = = be64_to_cpu ( vpa - > dtl_idx ) )
goto out ;
while ( i < be64_to_cpu ( vpa - > dtl_idx ) ) {
dtle = * dtl ;
barrier ( ) ;
if ( i + N_DISPATCH_LOG < be64_to_cpu ( vpa - > dtl_idx ) ) {
/* buffer has overflowed */
pr_debug_ratelimited ( " vcpudispatch_stats: cpu %d lost %lld DTL samples \n " ,
d - > cpu ,
be64_to_cpu ( vpa - > dtl_idx ) - N_DISPATCH_LOG - i ) ;
i = be64_to_cpu ( vpa - > dtl_idx ) - N_DISPATCH_LOG ;
dtl = local_paca - > dispatch_log + ( i % N_DISPATCH_LOG ) ;
continue ;
}
update_vcpu_disp_stat ( be16_to_cpu ( dtle . processor_id ) ) ;
+ + i ;
+ + dtl ;
if ( dtl = = dtl_end )
dtl = local_paca - > dispatch_log ;
}
__this_cpu_write ( dtl_entry_ridx , i ) ;
out :
schedule_delayed_work_on ( d - > cpu , to_delayed_work ( work ) ,
HZ / vcpudispatch_stats_freq ) ;
}
static int dtl_worker_online ( unsigned int cpu )
{
struct dtl_worker * d = & per_cpu ( dtl_workers , cpu ) ;
memset ( d , 0 , sizeof ( * d ) ) ;
INIT_DELAYED_WORK ( & d - > work , process_dtl_buffer ) ;
d - > cpu = cpu ;
# ifndef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
per_cpu ( dtl_entry_ridx , cpu ) = 0 ;
register_dtl_buffer ( cpu ) ;
# else
per_cpu ( dtl_entry_ridx , cpu ) = be64_to_cpu ( lppaca_of ( cpu ) . dtl_idx ) ;
# endif
schedule_delayed_work_on ( cpu , & d - > work , HZ / vcpudispatch_stats_freq ) ;
return 0 ;
}
static int dtl_worker_offline ( unsigned int cpu )
{
struct dtl_worker * d = & per_cpu ( dtl_workers , cpu ) ;
cancel_delayed_work_sync ( & d - > work ) ;
# ifndef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
unregister_dtl ( get_hard_smp_processor_id ( cpu ) ) ;
# endif
return 0 ;
}
static void set_global_dtl_mask ( u8 mask )
{
int cpu ;
dtl_mask = mask ;
for_each_present_cpu ( cpu )
lppaca_of ( cpu ) . dtl_enable_mask = dtl_mask ;
}
static void reset_global_dtl_mask ( void )
{
int cpu ;
# ifdef CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
dtl_mask = DTL_LOG_PREEMPT ;
# else
dtl_mask = 0 ;
# endif
for_each_present_cpu ( cpu )
lppaca_of ( cpu ) . dtl_enable_mask = dtl_mask ;
}
2019-07-03 20:04:01 +03:00
static int dtl_worker_enable ( unsigned long * time_limit )
2019-07-03 20:04:00 +03:00
{
int rc = 0 , state ;
if ( ! write_trylock ( & dtl_access_lock ) ) {
rc = - EBUSY ;
goto out ;
}
set_global_dtl_mask ( DTL_LOG_ALL ) ;
/* Setup dtl buffers and register those */
2019-07-03 20:04:01 +03:00
alloc_dtl_buffers ( time_limit ) ;
2019-07-03 20:04:00 +03:00
state = cpuhp_setup_state ( CPUHP_AP_ONLINE_DYN , " powerpc/dtl:online " ,
dtl_worker_online , dtl_worker_offline ) ;
if ( state < 0 ) {
pr_err ( " vcpudispatch_stats: unable to setup workqueue for DTL processing \n " ) ;
2019-07-03 20:04:01 +03:00
free_dtl_buffers ( time_limit ) ;
2019-07-03 20:04:00 +03:00
reset_global_dtl_mask ( ) ;
write_unlock ( & dtl_access_lock ) ;
rc = - EINVAL ;
goto out ;
}
dtl_worker_state = state ;
out :
return rc ;
}
2019-07-03 20:04:01 +03:00
static void dtl_worker_disable ( unsigned long * time_limit )
2019-07-03 20:04:00 +03:00
{
cpuhp_remove_state ( dtl_worker_state ) ;
2019-07-03 20:04:01 +03:00
free_dtl_buffers ( time_limit ) ;
2019-07-03 20:04:00 +03:00
reset_global_dtl_mask ( ) ;
write_unlock ( & dtl_access_lock ) ;
}
static ssize_t vcpudispatch_stats_write ( struct file * file , const char __user * p ,
size_t count , loff_t * ppos )
{
2019-07-03 20:04:01 +03:00
unsigned long time_limit = jiffies + HZ ;
2019-07-03 20:04:00 +03:00
struct vcpu_dispatch_data * disp ;
int rc , cmd , cpu ;
char buf [ 16 ] ;
if ( count > 15 )
return - EINVAL ;
if ( copy_from_user ( buf , p , count ) )
return - EFAULT ;
buf [ count ] = 0 ;
rc = kstrtoint ( buf , 0 , & cmd ) ;
if ( rc | | cmd < 0 | | cmd > 1 ) {
pr_err ( " vcpudispatch_stats: please use 0 to disable or 1 to enable dispatch statistics \n " ) ;
return rc ? rc : - EINVAL ;
}
mutex_lock ( & dtl_enable_mutex ) ;
if ( ( cmd = = 0 & & ! vcpudispatch_stats_on ) | |
( cmd = = 1 & & vcpudispatch_stats_on ) )
goto out ;
if ( cmd ) {
rc = init_cpu_associativity ( ) ;
if ( rc )
goto out ;
for_each_possible_cpu ( cpu ) {
disp = per_cpu_ptr ( & vcpu_disp_data , cpu ) ;
memset ( disp , 0 , sizeof ( * disp ) ) ;
disp - > last_disp_cpu = - 1 ;
}
2019-07-03 20:04:01 +03:00
rc = dtl_worker_enable ( & time_limit ) ;
2019-07-03 20:04:00 +03:00
if ( rc ) {
destroy_cpu_associativity ( ) ;
goto out ;
}
} else {
2019-07-03 20:04:01 +03:00
dtl_worker_disable ( & time_limit ) ;
2019-07-03 20:04:00 +03:00
destroy_cpu_associativity ( ) ;
}
vcpudispatch_stats_on = cmd ;
out :
mutex_unlock ( & dtl_enable_mutex ) ;
if ( rc )
return rc ;
return count ;
}
static int vcpudispatch_stats_display ( struct seq_file * p , void * v )
{
int cpu ;
struct vcpu_dispatch_data * disp ;
if ( ! vcpudispatch_stats_on ) {
seq_puts ( p , " off \n " ) ;
return 0 ;
}
for_each_online_cpu ( cpu ) {
disp = per_cpu_ptr ( & vcpu_disp_data , cpu ) ;
seq_printf ( p , " cpu%d " , cpu ) ;
seq_put_decimal_ull ( p , " " , disp - > total_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > same_cpu_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > same_chip_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > diff_chip_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > far_chip_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > numa_home_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > numa_remote_disp ) ;
seq_put_decimal_ull ( p , " " , disp - > numa_far_disp ) ;
seq_puts ( p , " \n " ) ;
}
return 0 ;
}
static int vcpudispatch_stats_open ( struct inode * inode , struct file * file )
{
return single_open ( file , vcpudispatch_stats_display , NULL ) ;
}
2020-02-04 04:37:17 +03:00
static const struct proc_ops vcpudispatch_stats_proc_ops = {
. proc_open = vcpudispatch_stats_open ,
. proc_read = seq_read ,
. proc_write = vcpudispatch_stats_write ,
. proc_lseek = seq_lseek ,
. proc_release = single_release ,
2019-07-03 20:04:00 +03:00
} ;
static ssize_t vcpudispatch_stats_freq_write ( struct file * file ,
const char __user * p , size_t count , loff_t * ppos )
{
int rc , freq ;
char buf [ 16 ] ;
if ( count > 15 )
return - EINVAL ;
if ( copy_from_user ( buf , p , count ) )
return - EFAULT ;
buf [ count ] = 0 ;
rc = kstrtoint ( buf , 0 , & freq ) ;
if ( rc | | freq < 1 | | freq > HZ ) {
pr_err ( " vcpudispatch_stats_freq: please specify a frequency between 1 and %d \n " ,
HZ ) ;
return rc ? rc : - EINVAL ;
}
vcpudispatch_stats_freq = freq ;
return count ;
}
static int vcpudispatch_stats_freq_display ( struct seq_file * p , void * v )
{
seq_printf ( p , " %d \n " , vcpudispatch_stats_freq ) ;
return 0 ;
}
static int vcpudispatch_stats_freq_open ( struct inode * inode , struct file * file )
{
return single_open ( file , vcpudispatch_stats_freq_display , NULL ) ;
}
2020-02-04 04:37:17 +03:00
static const struct proc_ops vcpudispatch_stats_freq_proc_ops = {
. proc_open = vcpudispatch_stats_freq_open ,
. proc_read = seq_read ,
. proc_write = vcpudispatch_stats_freq_write ,
. proc_lseek = seq_lseek ,
. proc_release = single_release ,
2019-07-03 20:04:00 +03:00
} ;
static int __init vcpudispatch_stats_procfs_init ( void )
{
2020-03-20 18:24:36 +03:00
/*
* Avoid smp_processor_id while preemptible . All CPUs should have
* the same value for lppaca_shared_proc .
*/
preempt_disable ( ) ;
if ( ! lppaca_shared_proc ( get_lppaca ( ) ) ) {
preempt_enable ( ) ;
2019-07-03 20:04:00 +03:00
return 0 ;
2020-03-20 18:24:36 +03:00
}
preempt_enable ( ) ;
2019-07-03 20:04:00 +03:00
if ( ! proc_create ( " powerpc/vcpudispatch_stats " , 0600 , NULL ,
& vcpudispatch_stats_proc_ops ) )
pr_err ( " vcpudispatch_stats: error creating procfs file \n " ) ;
else if ( ! proc_create ( " powerpc/vcpudispatch_stats_freq " , 0600 , NULL ,
& vcpudispatch_stats_freq_proc_ops ) )
pr_err ( " vcpudispatch_stats_freq: error creating procfs file \n " ) ;
return 0 ;
}
machine_device_initcall ( pseries , vcpudispatch_stats_procfs_init ) ;
2019-07-03 20:03:57 +03:00
# endif /* CONFIG_PPC_SPLPAR */
2005-04-17 02:20:36 +04:00
void vpa_init ( int cpu )
{
int hwcpu = get_hard_smp_processor_id ( cpu ) ;
2006-08-07 10:19:19 +04:00
unsigned long addr ;
2005-04-17 02:20:36 +04:00
long ret ;
2005-09-04 02:55:59 +04:00
2013-08-15 09:22:15 +04:00
/*
* The spec says it " may be problematic " if CPU x registers the VPA of
* CPU y . We should never do that , but wail if we ever do .
*/
WARN_ON ( cpu ! = smp_processor_id ( ) ) ;
2005-09-04 02:55:59 +04:00
if ( cpu_has_feature ( CPU_FTR_ALTIVEC ) )
2010-08-13 00:18:15 +04:00
lppaca_of ( cpu ) . vmxregs_in_use = 1 ;
2005-09-04 02:55:59 +04:00
2013-06-28 12:15:18 +04:00
if ( cpu_has_feature ( CPU_FTR_ARCH_207S ) )
lppaca_of ( cpu ) . ebb_regs_in_use = 1 ;
2010-08-13 00:18:15 +04:00
addr = __pa ( & lppaca_of ( cpu ) ) ;
2006-08-07 10:19:19 +04:00
ret = register_vpa ( hwcpu , addr ) ;
2005-04-17 02:20:36 +04:00
2006-08-07 10:19:19 +04:00
if ( ret ) {
2011-07-25 05:46:33 +04:00
pr_err ( " WARNING: VPA registration for cpu %d (hw %d) of area "
" %lx failed with %ld \n " , cpu , hwcpu , addr , ret ) ;
2006-08-07 10:19:19 +04:00
return ;
}
2016-04-29 16:26:08 +03:00
2017-10-19 07:08:43 +03:00
# ifdef CONFIG_PPC_BOOK3S_64
2006-08-07 10:19:19 +04:00
/*
* PAPR says this feature is SLB - Buffer but firmware never
* reports that . All SPLPAR support SLB shadow buffer .
*/
2016-04-29 16:26:08 +03:00
if ( ! radix_enabled ( ) & & firmware_has_feature ( FW_FEATURE_SPLPAR ) ) {
2018-02-13 18:08:12 +03:00
addr = __pa ( paca_ptrs [ cpu ] - > slb_shadow_ptr ) ;
2006-08-07 10:19:19 +04:00
ret = register_slb_shadow ( hwcpu , addr ) ;
if ( ret )
2011-07-25 05:46:33 +04:00
pr_err ( " WARNING: SLB shadow buffer registration for "
" cpu %d (hw %d) of area %lx failed with %ld \n " ,
cpu , hwcpu , addr , ret ) ;
2006-08-07 10:19:19 +04:00
}
2017-10-19 07:08:43 +03:00
# endif /* CONFIG_PPC_BOOK3S_64 */
powerpc: Account time using timebase rather than PURR
Currently, when CONFIG_VIRT_CPU_ACCOUNTING is enabled, we use the
PURR register for measuring the user and system time used by
processes, as well as other related times such as hardirq and
softirq times. This turns out to be quite confusing for users
because it means that a program will often be measured as taking
less time when run on a multi-threaded processor (SMT2 or SMT4 mode)
than it does when run on a single-threaded processor (ST mode), even
though the program takes longer to finish. The discrepancy is
accounted for as stolen time, which is also confusing, particularly
when there are no other partitions running.
This changes the accounting to use the timebase instead, meaning that
the reported user and system times are the actual number of real-time
seconds that the program was executing on the processor thread,
regardless of which SMT mode the processor is in. Thus a program will
generally show greater user and system times when run on a
multi-threaded processor than on a single-threaded processor.
On pSeries systems on POWER5 or later processors, we measure the
stolen time (time when this partition wasn't running) using the
hypervisor dispatch trace log. We check for new entries in the
log on every entry from user mode and on every transition from
kernel process context to soft or hard IRQ context (i.e. when
account_system_vtime() gets called). So that we can correctly
distinguish time stolen from user time and time stolen from system
time, without having to check the log on every exit to user mode,
we store separate timestamps for exit to user mode and entry from
user mode.
On systems that have a SPURR (POWER6 and POWER7), we read the SPURR
in account_system_vtime() (as before), and then apportion the SPURR
ticks since the last time we read it between scaled user time and
scaled system time according to the relative proportions of user
time and system time over the same interval. This avoids having to
read the SPURR on every kernel entry and exit. On systems that have
PURR but not SPURR (i.e., POWER5), we do the same using the PURR
rather than the SPURR.
This disables the DTL user interface in /sys/debug/kernel/powerpc/dtl
for now since it conflicts with the use of the dispatch trace log
by the time accounting code.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
2010-08-26 23:56:43 +04:00
/*
* Register dispatch trace log , if one has been allocated .
*/
2019-07-03 20:03:56 +03:00
register_dtl_buffer ( cpu ) ;
2005-04-17 02:20:36 +04:00
}
2017-10-19 07:08:43 +03:00
# ifdef CONFIG_PPC_BOOK3S_64
2016-04-29 16:26:08 +03:00
2021-12-01 17:41:40 +03:00
static int pseries_lpar_register_process_table ( unsigned long base ,
unsigned long page_size , unsigned long table_size )
{
long rc ;
unsigned long flags = 0 ;
if ( table_size )
flags | = PROC_TABLE_NEW ;
if ( radix_enabled ( ) ) {
flags | = PROC_TABLE_RADIX ;
if ( mmu_has_feature ( MMU_FTR_GTSE ) )
flags | = PROC_TABLE_GTSE ;
} else
flags | = PROC_TABLE_HPT_SLB ;
for ( ; ; ) {
rc = plpar_hcall_norets ( H_REGISTER_PROC_TBL , flags , base ,
page_size , table_size ) ;
if ( ! H_IS_LONG_BUSY ( rc ) )
break ;
mdelay ( get_longbusy_msecs ( rc ) ) ;
}
if ( rc ! = H_SUCCESS ) {
pr_err ( " Failed to register process table (rc=%ld) \n " , rc ) ;
BUG ( ) ;
}
return rc ;
}
2006-10-05 22:35:10 +04:00
static long pSeries_lpar_hpte_insert ( unsigned long hpte_group ,
2012-09-10 06:52:50 +04:00
unsigned long vpn , unsigned long pa ,
unsigned long rflags , unsigned long vflags ,
2013-04-28 13:37:35 +04:00
int psize , int apsize , int ssize )
2005-04-17 02:20:36 +04:00
{
unsigned long lpar_rc ;
unsigned long flags ;
unsigned long slot ;
2005-07-13 12:11:42 +04:00
unsigned long hpte_v , hpte_r ;
2005-04-17 02:20:36 +04:00
2005-11-07 03:06:55 +03:00
if ( ! ( vflags & HPTE_V_BOLTED ) )
2012-09-10 06:52:50 +04:00
pr_devel ( " hpte_insert(group=%lx, vpn=%016lx, "
" pa=%016lx, rflags=%lx, vflags=%lx, psize=%d) \n " ,
hpte_group , vpn , pa , rflags , vflags , psize ) ;
2005-11-07 03:06:55 +03:00
2013-04-28 13:37:35 +04:00
hpte_v = hpte_encode_v ( vpn , psize , apsize , ssize ) | vflags | HPTE_V_VALID ;
2016-11-11 08:55:03 +03:00
hpte_r = hpte_encode_r ( pa , psize , apsize ) | rflags ;
2005-11-07 03:06:55 +03:00
if ( ! ( vflags & HPTE_V_BOLTED ) )
2009-06-17 22:13:50 +04:00
pr_devel ( " hpte_v=%016lx, hpte_r=%016lx \n " , hpte_v , hpte_r ) ;
2005-11-07 03:06:55 +03:00
2005-04-17 02:20:36 +04:00
/* Now fill in the actual HPTE */
/* Set CEC cookie to 0 */
/* Zero page = 0 */
/* I-cache Invalidate = 0 */
/* I-cache synchronize = 0 */
/* Exact = 0 */
flags = 0 ;
2011-05-04 10:01:20 +04:00
if ( firmware_has_feature ( FW_FEATURE_XCMO ) & & ! ( hpte_r & HPTE_R_N ) )
flags | = H_COALESCE_CAND ;
2005-04-17 02:20:36 +04:00
2006-07-19 02:01:28 +04:00
lpar_rc = plpar_pte_enter ( flags , hpte_group , hpte_v , hpte_r , & slot ) ;
2006-03-30 16:49:40 +04:00
if ( unlikely ( lpar_rc = = H_PTEG_FULL ) ) {
2018-06-29 11:39:04 +03:00
pr_devel ( " Hash table group is full \n " ) ;
2005-04-17 02:20:36 +04:00
return - 1 ;
2005-11-07 03:06:55 +03:00
}
2005-04-17 02:20:36 +04:00
/*
* Since we try and ioremap PHBs we don ' t own , the pte insert
* will fail . However we must catch the failure in hash_page
* or we will loop forever , so return - 2 in this case .
*/
2006-03-30 16:49:40 +04:00
if ( unlikely ( lpar_rc ! = H_SUCCESS ) ) {
2018-06-29 11:39:04 +03:00
pr_err ( " Failed hash pte insert with error %ld \n " , lpar_rc ) ;
2005-04-17 02:20:36 +04:00
return - 2 ;
2005-11-07 03:06:55 +03:00
}
if ( ! ( vflags & HPTE_V_BOLTED ) )
2009-06-17 22:13:50 +04:00
pr_devel ( " -> slot: %lu \n " , slot & 7 ) ;
2005-04-17 02:20:36 +04:00
/* Because of iSeries, we have to pass down the secondary
* bucket bit here as well
*/
2005-07-13 12:11:42 +04:00
return ( slot & 7 ) | ( ! ! ( vflags & HPTE_V_SECONDARY ) < < 3 ) ;
2005-04-17 02:20:36 +04:00
}
static DEFINE_SPINLOCK ( pSeries_lpar_tlbie_lock ) ;
static long pSeries_lpar_hpte_remove ( unsigned long hpte_group )
{
unsigned long slot_offset ;
unsigned long lpar_rc ;
int i ;
unsigned long dummy1 , dummy2 ;
/* pick a random slot to start at */
slot_offset = mftb ( ) & 0x7 ;
for ( i = 0 ; i < HPTES_PER_GROUP ; i + + ) {
/* don't remove a bolted entry */
lpar_rc = plpar_pte_remove ( H_ANDCOND , hpte_group + slot_offset ,
2019-10-24 12:35:40 +03:00
HPTE_V_BOLTED , & dummy1 , & dummy2 ) ;
2006-03-30 16:49:40 +04:00
if ( lpar_rc = = H_SUCCESS )
2005-04-17 02:20:36 +04:00
return i ;
2013-04-05 14:41:40 +04:00
/*
* The test for adjunct partition is performed before the
* ANDCOND test . H_RESOURCE may be returned , so we need to
* check for that as well .
*/
BUG_ON ( lpar_rc ! = H_NOT_FOUND & & lpar_rc ! = H_RESOURCE ) ;
2005-04-17 02:20:36 +04:00
slot_offset + + ;
slot_offset & = 0x7 ;
}
return - 1 ;
}
2021-07-14 15:47:58 +03:00
/* Called during kexec sequence with MMU off */
static notrace void manual_hpte_clear_all ( void )
2005-04-17 02:20:36 +04:00
{
unsigned long size_bytes = 1UL < < ppc64_pft_size ;
unsigned long hpte_count = size_bytes > > 4 ;
2010-05-11 00:28:26 +04:00
struct {
unsigned long pteh ;
unsigned long ptel ;
} ptes [ 4 ] ;
2007-06-14 09:31:34 +04:00
long lpar_rc ;
2011-07-26 22:15:03 +04:00
unsigned long i , j ;
2010-05-11 00:28:26 +04:00
/* Read in batches of 4,
* invalidate only valid entries not in the VRMA
* hpte_count will be a multiple of 4
*/
for ( i = 0 ; i < hpte_count ; i + = 4 ) {
lpar_rc = plpar_pte_read_4_raw ( 0 , i , ( void * ) ptes ) ;
2018-06-29 11:39:04 +03:00
if ( lpar_rc ! = H_SUCCESS ) {
pr_info ( " Failed to read hash page table at %ld err %ld \n " ,
i , lpar_rc ) ;
2010-05-11 00:28:26 +04:00
continue ;
2018-06-29 11:39:04 +03:00
}
2010-05-11 00:28:26 +04:00
for ( j = 0 ; j < 4 ; j + + ) {
if ( ( ptes [ j ] . pteh & HPTE_V_VRMA_MASK ) = =
HPTE_V_VRMA_MASK )
continue ;
if ( ptes [ j ] . pteh & HPTE_V_VALID )
plpar_pte_remove_raw ( 0 , i + j , 0 ,
& ( ptes [ j ] . pteh ) , & ( ptes [ j ] . ptel ) ) ;
2007-06-14 09:31:34 +04:00
}
}
2016-10-01 13:41:56 +03:00
}
2021-07-14 15:47:58 +03:00
/* Called during kexec sequence with MMU off */
static notrace int hcall_hpte_clear_all ( void )
2016-10-01 13:41:56 +03:00
{
int rc ;
do {
rc = plpar_hcall_norets ( H_CLEAR_HPT ) ;
} while ( rc = = H_CONTINUE ) ;
return rc ;
}
2021-07-14 15:47:58 +03:00
/* Called during kexec sequence with MMU off */
static notrace void pseries_hpte_clear_all ( void )
2016-10-01 13:41:56 +03:00
{
int rc ;
rc = hcall_hpte_clear_all ( ) ;
if ( rc ! = H_SUCCESS )
manual_hpte_clear_all ( ) ;
2013-11-20 15:14:59 +04:00
# ifdef __LITTLE_ENDIAN__
2014-10-01 11:02:30 +04:00
/*
* Reset exceptions to big endian .
*
* FIXME this is a hack for kexec , we need to reset the exception
* endian before starting the new kernel and this is a convenient place
* to do it .
*
* This is also called on boot when a fadump happens . In that case we
* must not change the exception endian mode .
*/
2016-07-05 08:03:49 +03:00
if ( firmware_has_feature ( FW_FEATURE_SET_MODE ) & & ! is_fadump_active ( ) )
pseries_big_endian_exceptions ( ) ;
2013-11-20 15:14:59 +04:00
# endif
2005-04-17 02:20:36 +04:00
}
/*
* NOTE : for updatepp ops we are fortunate that the linux " newpp " bits and
* the low 3 bits of flags happen to line up . So no transform is needed .
* We can probably optimize here and assume the high bits of newpp are
* already zero . For now I am paranoid .
*/
2005-11-07 03:06:55 +03:00
static long pSeries_lpar_hpte_updatepp ( unsigned long slot ,
unsigned long newpp ,
2012-09-10 06:52:50 +04:00
unsigned long vpn ,
2013-06-20 13:00:13 +04:00
int psize , int apsize ,
2014-12-04 08:30:14 +03:00
int ssize , unsigned long inv_flags )
2005-04-17 02:20:36 +04:00
{
unsigned long lpar_rc ;
powerpc/pseries: Fix passing of pp0 in updatepp() and updateboltedpp()
Once upon a time there were only two PP (page protection) bits. In ISA
2.03 an additional PP bit was added, but because of the layout of the
HPTE it could not be made contiguous with the existing PP bits.
The result is that we now have three PP bits, named pp0, pp1, pp2,
where pp0 occupies bit 63 of dword 1 of the HPTE and pp1 and pp2
occupy bits 1 and 0 respectively. Until recently Linux hasn't used
pp0, however with the addition of _PAGE_KERNEL_RO we started using it.
The problem arises in the LPAR code, where we need to translate the PP
bits into the argument for the H_PROTECT hypercall. Currently the code
only passes bits 0-2 of newpp, which covers pp1, pp2 and N (no
execute), meaning pp0 is not passed to the hypervisor at all.
We can't simply pass it through in bit 63, as that would collide with a
different field in the flags argument, as defined in PAPR. Instead we
have to shift it down to bit 8 (IBM bit 55).
Fixes: e58e87adc8bf ("powerpc/mm: Update _PAGE_KERNEL_RO")
Cc: stable@vger.kernel.org # v4.7+
Signed-off-by: Balbir Singh <bsingharora@gmail.com>
[mpe: Simplify the test, rework change log]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-06-28 20:04:07 +03:00
unsigned long flags ;
2005-11-07 03:06:55 +03:00
unsigned long want_v ;
2005-04-17 02:20:36 +04:00
2012-09-10 06:52:50 +04:00
want_v = hpte_encode_avpn ( vpn , psize , ssize ) ;
2005-04-17 02:20:36 +04:00
2021-03-26 10:07:55 +03:00
flags = ( newpp & ( HPTE_R_PP | HPTE_R_N | HPTE_R_KEY_LO ) ) | H_AVPN ;
flags | = ( newpp & HPTE_R_KEY_HI ) > > 48 ;
powerpc/pseries: Fix passing of pp0 in updatepp() and updateboltedpp()
Once upon a time there were only two PP (page protection) bits. In ISA
2.03 an additional PP bit was added, but because of the layout of the
HPTE it could not be made contiguous with the existing PP bits.
The result is that we now have three PP bits, named pp0, pp1, pp2,
where pp0 occupies bit 63 of dword 1 of the HPTE and pp1 and pp2
occupy bits 1 and 0 respectively. Until recently Linux hasn't used
pp0, however with the addition of _PAGE_KERNEL_RO we started using it.
The problem arises in the LPAR code, where we need to translate the PP
bits into the argument for the H_PROTECT hypercall. Currently the code
only passes bits 0-2 of newpp, which covers pp1, pp2 and N (no
execute), meaning pp0 is not passed to the hypervisor at all.
We can't simply pass it through in bit 63, as that would collide with a
different field in the flags argument, as defined in PAPR. Instead we
have to shift it down to bit 8 (IBM bit 55).
Fixes: e58e87adc8bf ("powerpc/mm: Update _PAGE_KERNEL_RO")
Cc: stable@vger.kernel.org # v4.7+
Signed-off-by: Balbir Singh <bsingharora@gmail.com>
[mpe: Simplify the test, rework change log]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-06-28 20:04:07 +03:00
if ( mmu_has_feature ( MMU_FTR_KERNEL_RO ) )
/* Move pp0 into bit 8 (IBM 55) */
flags | = ( newpp & HPTE_R_PP0 ) > > 55 ;
2018-01-09 08:52:14 +03:00
pr_devel ( " update: avpnv=%016lx, hash=%016lx, f=%lx, psize: %d ... " ,
want_v , slot , flags , psize ) ;
2007-10-11 14:37:10 +04:00
lpar_rc = plpar_pte_protect ( flags , slot , want_v ) ;
2005-11-07 03:06:55 +03:00
2006-03-30 16:49:40 +04:00
if ( lpar_rc = = H_NOT_FOUND ) {
2009-06-17 22:13:50 +04:00
pr_devel ( " not found ! \n " ) ;
2005-04-17 02:20:36 +04:00
return - 1 ;
2005-11-07 03:06:55 +03:00
}
2009-06-17 22:13:50 +04:00
pr_devel ( " ok \n " ) ;
2005-04-17 02:20:36 +04:00
2006-03-30 16:49:40 +04:00
BUG_ON ( lpar_rc ! = H_SUCCESS ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
}
2015-12-01 06:36:59 +03:00
static long __pSeries_lpar_hpte_find ( unsigned long want_v , unsigned long hpte_group )
2005-04-17 02:20:36 +04:00
{
2015-12-01 06:36:59 +03:00
long lpar_rc ;
unsigned long i , j ;
struct {
unsigned long pteh ;
unsigned long ptel ;
} ptes [ 4 ] ;
2005-04-17 02:20:36 +04:00
2015-12-01 06:36:59 +03:00
for ( i = 0 ; i < HPTES_PER_GROUP ; i + = 4 , hpte_group + = 4 ) {
2005-04-17 02:20:36 +04:00
2015-12-01 06:36:59 +03:00
lpar_rc = plpar_pte_read_4 ( 0 , hpte_group , ( void * ) ptes ) ;
2018-06-29 11:39:04 +03:00
if ( lpar_rc ! = H_SUCCESS ) {
pr_info ( " Failed to read hash page table at %ld err %ld \n " ,
hpte_group , lpar_rc ) ;
2015-12-01 06:36:59 +03:00
continue ;
2018-06-29 11:39:04 +03:00
}
2005-04-17 02:20:36 +04:00
2015-12-01 06:36:59 +03:00
for ( j = 0 ; j < 4 ; j + + ) {
if ( HPTE_V_COMPARE ( ptes [ j ] . pteh , want_v ) & &
( ptes [ j ] . pteh & HPTE_V_VALID ) )
return i + j ;
}
}
2005-04-17 02:20:36 +04:00
2015-12-01 06:36:59 +03:00
return - 1 ;
2005-04-17 02:20:36 +04:00
}
2012-09-10 06:52:50 +04:00
static long pSeries_lpar_hpte_find ( unsigned long vpn , int psize , int ssize )
2005-04-17 02:20:36 +04:00
{
long slot ;
2015-12-01 06:36:59 +03:00
unsigned long hash ;
unsigned long want_v ;
unsigned long hpte_group ;
2005-04-17 02:20:36 +04:00
2012-09-10 06:52:50 +04:00
hash = hpt_hash ( vpn , mmu_psize_defs [ psize ] . shift , ssize ) ;
want_v = hpte_encode_avpn ( vpn , psize , ssize ) ;
2007-10-11 14:37:10 +04:00
2019-10-24 12:35:42 +03:00
/*
* We try to keep bolted entries always in primary hash
* But in some case we can find them in secondary too .
*/
2015-12-01 06:36:59 +03:00
hpte_group = ( hash & htab_hash_mask ) * HPTES_PER_GROUP ;
slot = __pSeries_lpar_hpte_find ( want_v , hpte_group ) ;
2019-10-24 12:35:42 +03:00
if ( slot < 0 ) {
/* Try in secondary */
hpte_group = ( ~ hash & htab_hash_mask ) * HPTES_PER_GROUP ;
slot = __pSeries_lpar_hpte_find ( want_v , hpte_group ) ;
if ( slot < 0 )
return - 1 ;
}
2015-12-01 06:36:59 +03:00
return hpte_group + slot ;
}
2005-04-17 02:20:36 +04:00
static void pSeries_lpar_hpte_updateboltedpp ( unsigned long newpp ,
2005-11-07 03:06:55 +03:00
unsigned long ea ,
2007-10-11 14:37:10 +04:00
int psize , int ssize )
2005-04-17 02:20:36 +04:00
{
2012-09-10 06:52:50 +04:00
unsigned long vpn ;
unsigned long lpar_rc , slot , vsid , flags ;
2005-04-17 02:20:36 +04:00
2007-10-11 14:37:10 +04:00
vsid = get_kernel_vsid ( ea , ssize ) ;
2012-09-10 06:52:50 +04:00
vpn = hpt_vpn ( ea , vsid , ssize ) ;
2005-04-17 02:20:36 +04:00
2012-09-10 06:52:50 +04:00
slot = pSeries_lpar_hpte_find ( vpn , psize , ssize ) ;
2005-04-17 02:20:36 +04:00
BUG_ON ( slot = = - 1 ) ;
powerpc/pseries: Add key to flags in pSeries_lpar_hpte_updateboltedpp()
The flags argument to plpar_pte_protect() (aka. H_PROTECT), includes
the key in bits 9-13, but currently we always set those bits to zero.
In the past that hasn't been a problem because we always used key 0
for the kernel, and updateboltedpp() is only used for kernel mappings.
However since commit d94b827e89dc ("powerpc/book3s64/kuap: Use Key 3
for kernel mapping with hash translation") we are now inadvertently
changing the key (to zero) when we call plpar_pte_protect().
That hasn't broken anything because updateboltedpp() is only used for
STRICT_KERNEL_RWX, which is currently disabled on 64s due to other
bugs.
But we want to fix that, so first we need to pass the key correctly to
plpar_pte_protect(). We can't pass our newpp value directly in, we
have to convert it into the form expected by the hcall.
The hcall we're using here is H_PROTECT, which is specified in section
14.5.4.1.6 of LoPAPR v1.1.
It takes a `flags` parameter, and the description for flags says:
* flags: AVPN, pp0, pp1, pp2, key0-key4, n, and for the CMO
option: CMO Option flags as defined in Table 189‚
If you then go to the start of the parent section, 14.5.4.1, on page
405, it says:
Register Linkage (For hcall() tokens 0x04 - 0x18)
* On Call
* R3 function call token
* R4 flags (see Table 178‚ “Page Frame Table Access flags field
definition‚” on page 401)
Then you have to go to section 14.5.3, and on page 394 there is a list
of hcalls and their tokens (table 176), and there you can see that
H_PROTECT == 0x18.
Finally you can look at table 178, on page 401, where it specifies the
layout of the bits for the key:
Bit Function
-----------------
50-54 | key0-key4
Those are big-endian bit numbers, converting to normal bit numbers you
get bits 9-13, or 0x3e00.
In the kernel we have:
#define HPTE_R_KEY_HI ASM_CONST(0x3000000000000000)
#define HPTE_R_KEY_LO ASM_CONST(0x0000000000000e00)
So the LO bits of newpp are already in the right place, and the HI
bits need to be shifted down by 48.
Fixes: d94b827e89dc ("powerpc/book3s64/kuap: Use Key 3 for kernel mapping with hash translation")
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20210331003845.216246-2-mpe@ellerman.id.au
2021-03-31 03:38:41 +03:00
flags = newpp & ( HPTE_R_PP | HPTE_R_N ) ;
powerpc/pseries: Fix passing of pp0 in updatepp() and updateboltedpp()
Once upon a time there were only two PP (page protection) bits. In ISA
2.03 an additional PP bit was added, but because of the layout of the
HPTE it could not be made contiguous with the existing PP bits.
The result is that we now have three PP bits, named pp0, pp1, pp2,
where pp0 occupies bit 63 of dword 1 of the HPTE and pp1 and pp2
occupy bits 1 and 0 respectively. Until recently Linux hasn't used
pp0, however with the addition of _PAGE_KERNEL_RO we started using it.
The problem arises in the LPAR code, where we need to translate the PP
bits into the argument for the H_PROTECT hypercall. Currently the code
only passes bits 0-2 of newpp, which covers pp1, pp2 and N (no
execute), meaning pp0 is not passed to the hypervisor at all.
We can't simply pass it through in bit 63, as that would collide with a
different field in the flags argument, as defined in PAPR. Instead we
have to shift it down to bit 8 (IBM bit 55).
Fixes: e58e87adc8bf ("powerpc/mm: Update _PAGE_KERNEL_RO")
Cc: stable@vger.kernel.org # v4.7+
Signed-off-by: Balbir Singh <bsingharora@gmail.com>
[mpe: Simplify the test, rework change log]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-06-28 20:04:07 +03:00
if ( mmu_has_feature ( MMU_FTR_KERNEL_RO ) )
/* Move pp0 into bit 8 (IBM 55) */
flags | = ( newpp & HPTE_R_PP0 ) > > 55 ;
powerpc/pseries: Add key to flags in pSeries_lpar_hpte_updateboltedpp()
The flags argument to plpar_pte_protect() (aka. H_PROTECT), includes
the key in bits 9-13, but currently we always set those bits to zero.
In the past that hasn't been a problem because we always used key 0
for the kernel, and updateboltedpp() is only used for kernel mappings.
However since commit d94b827e89dc ("powerpc/book3s64/kuap: Use Key 3
for kernel mapping with hash translation") we are now inadvertently
changing the key (to zero) when we call plpar_pte_protect().
That hasn't broken anything because updateboltedpp() is only used for
STRICT_KERNEL_RWX, which is currently disabled on 64s due to other
bugs.
But we want to fix that, so first we need to pass the key correctly to
plpar_pte_protect(). We can't pass our newpp value directly in, we
have to convert it into the form expected by the hcall.
The hcall we're using here is H_PROTECT, which is specified in section
14.5.4.1.6 of LoPAPR v1.1.
It takes a `flags` parameter, and the description for flags says:
* flags: AVPN, pp0, pp1, pp2, key0-key4, n, and for the CMO
option: CMO Option flags as defined in Table 189‚
If you then go to the start of the parent section, 14.5.4.1, on page
405, it says:
Register Linkage (For hcall() tokens 0x04 - 0x18)
* On Call
* R3 function call token
* R4 flags (see Table 178‚ “Page Frame Table Access flags field
definition‚” on page 401)
Then you have to go to section 14.5.3, and on page 394 there is a list
of hcalls and their tokens (table 176), and there you can see that
H_PROTECT == 0x18.
Finally you can look at table 178, on page 401, where it specifies the
layout of the bits for the key:
Bit Function
-----------------
50-54 | key0-key4
Those are big-endian bit numbers, converting to normal bit numbers you
get bits 9-13, or 0x3e00.
In the kernel we have:
#define HPTE_R_KEY_HI ASM_CONST(0x3000000000000000)
#define HPTE_R_KEY_LO ASM_CONST(0x0000000000000e00)
So the LO bits of newpp are already in the right place, and the HI
bits need to be shifted down by 48.
Fixes: d94b827e89dc ("powerpc/book3s64/kuap: Use Key 3 for kernel mapping with hash translation")
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20210331003845.216246-2-mpe@ellerman.id.au
2021-03-31 03:38:41 +03:00
flags | = ( ( newpp & HPTE_R_KEY_HI ) > > 48 ) | ( newpp & HPTE_R_KEY_LO ) ;
2005-04-17 02:20:36 +04:00
lpar_rc = plpar_pte_protect ( flags , slot , 0 ) ;
2006-03-30 16:49:40 +04:00
BUG_ON ( lpar_rc ! = H_SUCCESS ) ;
2005-04-17 02:20:36 +04:00
}
2012-09-10 06:52:50 +04:00
static void pSeries_lpar_hpte_invalidate ( unsigned long slot , unsigned long vpn ,
2013-06-20 13:00:13 +04:00
int psize , int apsize ,
int ssize , int local )
2005-04-17 02:20:36 +04:00
{
2005-11-07 03:06:55 +03:00
unsigned long want_v ;
2005-04-17 02:20:36 +04:00
unsigned long lpar_rc ;
unsigned long dummy1 , dummy2 ;
2012-09-10 06:52:50 +04:00
pr_devel ( " inval : slot=%lx, vpn=%016lx, psize: %d, local: %d \n " ,
slot , vpn , psize , local ) ;
2005-04-17 02:20:36 +04:00
2012-09-10 06:52:50 +04:00
want_v = hpte_encode_avpn ( vpn , psize , ssize ) ;
2007-10-11 14:37:10 +04:00
lpar_rc = plpar_pte_remove ( H_AVPN , slot , want_v , & dummy1 , & dummy2 ) ;
2006-03-30 16:49:40 +04:00
if ( lpar_rc = = H_NOT_FOUND )
2005-04-17 02:20:36 +04:00
return ;
2006-03-30 16:49:40 +04:00
BUG_ON ( lpar_rc ! = H_SUCCESS ) ;
2005-04-17 02:20:36 +04:00
}
2018-08-20 17:29:36 +03:00
/*
* As defined in the PAPR ' s section 14.5 .4 .1 .8
* The control mask doesn ' t include the returned reference and change bit from
* the processed PTE .
*/
# define HBLKR_AVPN 0x0100000000000000UL
# define HBLKR_CTRL_MASK 0xf800000000000000UL
# define HBLKR_CTRL_SUCCESS 0x8000000000000000UL
# define HBLKR_CTRL_ERRNOTFOUND 0x8800000000000000UL
# define HBLKR_CTRL_ERRBUSY 0xa000000000000000UL
powerpc/pseries: Call H_BLOCK_REMOVE when supported
Depending on the hardware and the hypervisor, the hcall H_BLOCK_REMOVE
may not be able to process all the page sizes for a segment base page
size, as reported by the TLB Invalidate Characteristics.
For each pair of base segment page size and actual page size, this
characteristic tells us the size of the block the hcall supports.
In the case, the hcall is not supporting a pair of base segment page
size, actual page size, it is returning H_PARAM which leads to a panic
like this:
kernel BUG at /home/srikar/work/linux.git/arch/powerpc/platforms/pseries/lpar.c:466!
Oops: Exception in kernel mode, sig: 5 [#1]
BE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
CPU: 28 PID: 583 Comm: modprobe Not tainted 5.2.0-master #5
NIP: c0000000000be8dc LR: c0000000000be880 CTR: 0000000000000000
REGS: c0000007e77fb130 TRAP: 0700 Not tainted (5.2.0-master)
MSR: 8000000000029032 <SF,EE,ME,IR,DR,RI> CR: 42224824 XER: 20000000
CFAR: c0000000000be8fc IRQMASK: 0
GPR00: 0000000022224828 c0000007e77fb3c0 c000000001434d00 0000000000000005
GPR04: 9000000004fa8c00 0000000000000000 0000000000000003 0000000000000001
GPR08: c0000007e77fb450 0000000000000000 0000000000000001 ffffffffffffffff
GPR12: c0000007e77fb450 c00000000edfcb80 0000cd7d3ea30000 c0000000016022b0
GPR16: 00000000000000b0 0000cd7d3ea30000 0000000000000001 c080001f04f00105
GPR20: 0000000000000003 0000000000000004 c000000fbeb05f58 c000000001602200
GPR24: 0000000000000000 0000000000000004 8800000000000000 c000000000c5d148
GPR28: c000000000000000 8000000000000000 a000000000000000 c0000007e77fb580
NIP [c0000000000be8dc] .call_block_remove+0x12c/0x220
LR [c0000000000be880] .call_block_remove+0xd0/0x220
Call Trace:
0xc000000fb8c00240 (unreliable)
.pSeries_lpar_flush_hash_range+0x578/0x670
.flush_hash_range+0x44/0x100
.__flush_tlb_pending+0x3c/0xc0
.zap_pte_range+0x7ec/0x830
.unmap_page_range+0x3f4/0x540
.unmap_vmas+0x94/0x120
.exit_mmap+0xac/0x1f0
.mmput+0x9c/0x1f0
.do_exit+0x388/0xd60
.do_group_exit+0x54/0x100
.__se_sys_exit_group+0x14/0x20
system_call+0x5c/0x70
Instruction dump:
39400001 38a00000 4800003c 60000000 60420000 7fa9e800 38e00000 419e0014
7d29d278 7d290074 7929d182 69270001 <0b070000> 7d495378 394a0001 7fa93040
The call to H_BLOCK_REMOVE should only be made for the supported pair
of base segment page size, actual page size and using the correct
maximum block size.
Due to the required complexity in do_block_remove() and
call_block_remove(), and the fact that currently a block size of 8 is
returned by the hypervisor, we are only supporting 8 size block to the
H_BLOCK_REMOVE hcall.
In order to identify this limitation easily in the code, a local
define HBLKR_SUPPORTED_SIZE defining the currently supported block
size, and a dedicated checking helper is_supported_hlbkr() are
introduced.
For regular pages and hugetlb, the assumption is made that the page
size is equal to the base page size. For THP the page size is assumed
to be 16M.
Fixes: ba2dd8a26baa ("powerpc/pseries/mm: call H_BLOCK_REMOVE")
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190920130523.20441-3-ldufour@linux.ibm.com
2019-09-20 16:05:23 +03:00
/*
* Returned true if we are supporting this block size for the specified segment
* base page size and actual page size .
*
* Currently , we only support 8 size block .
*/
static inline bool is_supported_hlbkrm ( int bpsize , int psize )
{
return ( hblkrm_size [ bpsize ] [ psize ] = = HBLKRM_SUPPORTED_BLOCK_SIZE ) ;
}
2018-08-20 17:29:36 +03:00
/**
* H_BLOCK_REMOVE caller .
* @ idx should point to the latest @ param entry set with a PTEX .
* If PTE cannot be processed because another CPUs has already locked that
* group , those entries are put back in @ param starting at index 1.
* If entries has to be retried and @ retry_busy is set to true , these entries
* are retried until success . If @ retry_busy is set to false , the returned
* is the number of entries yet to process .
*/
static unsigned long call_block_remove ( unsigned long idx , unsigned long * param ,
bool retry_busy )
{
unsigned long i , rc , new_idx ;
unsigned long retbuf [ PLPAR_HCALL9_BUFSIZE ] ;
if ( idx < 2 ) {
pr_warn ( " Unexpected empty call to H_BLOCK_REMOVE " ) ;
return 0 ;
}
again :
new_idx = 0 ;
if ( idx > PLPAR_HCALL9_BUFSIZE ) {
pr_err ( " Too many PTEs (%lu) for H_BLOCK_REMOVE " , idx ) ;
idx = PLPAR_HCALL9_BUFSIZE ;
} else if ( idx < PLPAR_HCALL9_BUFSIZE )
param [ idx ] = HBR_END ;
rc = plpar_hcall9 ( H_BLOCK_REMOVE , retbuf ,
param [ 0 ] , /* AVA */
param [ 1 ] , param [ 2 ] , param [ 3 ] , param [ 4 ] , /* TS0-7 */
param [ 5 ] , param [ 6 ] , param [ 7 ] , param [ 8 ] ) ;
if ( rc = = H_SUCCESS )
return 0 ;
BUG_ON ( rc ! = H_PARTIAL ) ;
/* Check that the unprocessed entries were 'not found' or 'busy' */
for ( i = 0 ; i < idx - 1 ; i + + ) {
unsigned long ctrl = retbuf [ i ] & HBLKR_CTRL_MASK ;
if ( ctrl = = HBLKR_CTRL_ERRBUSY ) {
param [ + + new_idx ] = param [ i + 1 ] ;
continue ;
}
BUG_ON ( ctrl ! = HBLKR_CTRL_SUCCESS
& & ctrl ! = HBLKR_CTRL_ERRNOTFOUND ) ;
}
/*
* If there were entries found busy , retry these entries if requested ,
* of if all the entries have to be retried .
*/
if ( new_idx & & ( retry_busy | | new_idx = = ( PLPAR_HCALL9_BUFSIZE - 1 ) ) ) {
idx = new_idx + 1 ;
goto again ;
}
return new_idx ;
}
2015-12-01 06:36:53 +03:00
# ifdef CONFIG_TRANSPARENT_HUGEPAGE
2013-06-20 13:00:27 +04:00
/*
* Limit iterations holding pSeries_lpar_tlbie_lock to 3. We also need
* to make sure that we avoid bouncing the hypervisor tlbie lock .
*/
# define PPC64_HUGE_HPTE_BATCH 12
2018-08-20 17:29:36 +03:00
static void hugepage_block_invalidate ( unsigned long * slot , unsigned long * vpn ,
int count , int psize , int ssize )
2013-06-20 13:00:27 +04:00
{
2016-10-06 16:33:21 +03:00
unsigned long param [ PLPAR_HCALL9_BUFSIZE ] ;
2018-08-20 17:29:36 +03:00
unsigned long shift , current_vpgb , vpgb ;
int i , pix = 0 ;
2013-06-20 13:00:27 +04:00
2018-08-20 17:29:36 +03:00
shift = mmu_psize_defs [ psize ] . shift ;
for ( i = 0 ; i < count ; i + + ) {
/*
* Shifting 3 bits more on the right to get a
* 8 pages aligned virtual addresse .
*/
vpgb = ( vpn [ i ] > > ( shift - VPN_SHIFT + 3 ) ) ;
if ( ! pix | | vpgb ! = current_vpgb ) {
/*
* Need to start a new 8 pages block , flush
* the current one if needed .
*/
if ( pix )
( void ) call_block_remove ( pix , param , true ) ;
current_vpgb = vpgb ;
param [ 0 ] = hpte_encode_avpn ( vpn [ i ] , psize , ssize ) ;
pix = 1 ;
}
param [ pix + + ] = HBR_REQUEST | HBLKR_AVPN | slot [ i ] ;
if ( pix = = PLPAR_HCALL9_BUFSIZE ) {
pix = call_block_remove ( pix , param , false ) ;
/*
* pix = 0 means that all the entries were
* removed , we can start a new block .
* Otherwise , this means that there are entries
* to retry , and pix points to latest one , so
* we should increment it and try to continue
* the same block .
*/
if ( pix )
pix + + ;
}
}
if ( pix )
( void ) call_block_remove ( pix , param , true ) ;
}
static void hugepage_bulk_invalidate ( unsigned long * slot , unsigned long * vpn ,
int count , int psize , int ssize )
{
unsigned long param [ PLPAR_HCALL9_BUFSIZE ] ;
int i = 0 , pix = 0 , rc ;
2013-06-20 13:00:27 +04:00
for ( i = 0 ; i < count ; i + + ) {
if ( ! firmware_has_feature ( FW_FEATURE_BULK_REMOVE ) ) {
pSeries_lpar_hpte_invalidate ( slot [ i ] , vpn [ i ] , psize , 0 ,
ssize , 0 ) ;
} else {
param [ pix ] = HBR_REQUEST | HBR_AVPN | slot [ i ] ;
param [ pix + 1 ] = hpte_encode_avpn ( vpn [ i ] , psize , ssize ) ;
pix + = 2 ;
if ( pix = = 8 ) {
rc = plpar_hcall9 ( H_BULK_REMOVE , param ,
param [ 0 ] , param [ 1 ] , param [ 2 ] ,
param [ 3 ] , param [ 4 ] , param [ 5 ] ,
param [ 6 ] , param [ 7 ] ) ;
BUG_ON ( rc ! = H_SUCCESS ) ;
pix = 0 ;
}
}
}
if ( pix ) {
param [ pix ] = HBR_END ;
rc = plpar_hcall9 ( H_BULK_REMOVE , param , param [ 0 ] , param [ 1 ] ,
param [ 2 ] , param [ 3 ] , param [ 4 ] , param [ 5 ] ,
param [ 6 ] , param [ 7 ] ) ;
BUG_ON ( rc ! = H_SUCCESS ) ;
}
2018-08-20 17:29:36 +03:00
}
static inline void __pSeries_lpar_hugepage_invalidate ( unsigned long * slot ,
unsigned long * vpn ,
int count , int psize ,
int ssize )
{
unsigned long flags = 0 ;
int lock_tlbie = ! mmu_has_feature ( MMU_FTR_LOCKLESS_TLBIE ) ;
if ( lock_tlbie )
spin_lock_irqsave ( & pSeries_lpar_tlbie_lock , flags ) ;
powerpc/pseries: Call H_BLOCK_REMOVE when supported
Depending on the hardware and the hypervisor, the hcall H_BLOCK_REMOVE
may not be able to process all the page sizes for a segment base page
size, as reported by the TLB Invalidate Characteristics.
For each pair of base segment page size and actual page size, this
characteristic tells us the size of the block the hcall supports.
In the case, the hcall is not supporting a pair of base segment page
size, actual page size, it is returning H_PARAM which leads to a panic
like this:
kernel BUG at /home/srikar/work/linux.git/arch/powerpc/platforms/pseries/lpar.c:466!
Oops: Exception in kernel mode, sig: 5 [#1]
BE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
CPU: 28 PID: 583 Comm: modprobe Not tainted 5.2.0-master #5
NIP: c0000000000be8dc LR: c0000000000be880 CTR: 0000000000000000
REGS: c0000007e77fb130 TRAP: 0700 Not tainted (5.2.0-master)
MSR: 8000000000029032 <SF,EE,ME,IR,DR,RI> CR: 42224824 XER: 20000000
CFAR: c0000000000be8fc IRQMASK: 0
GPR00: 0000000022224828 c0000007e77fb3c0 c000000001434d00 0000000000000005
GPR04: 9000000004fa8c00 0000000000000000 0000000000000003 0000000000000001
GPR08: c0000007e77fb450 0000000000000000 0000000000000001 ffffffffffffffff
GPR12: c0000007e77fb450 c00000000edfcb80 0000cd7d3ea30000 c0000000016022b0
GPR16: 00000000000000b0 0000cd7d3ea30000 0000000000000001 c080001f04f00105
GPR20: 0000000000000003 0000000000000004 c000000fbeb05f58 c000000001602200
GPR24: 0000000000000000 0000000000000004 8800000000000000 c000000000c5d148
GPR28: c000000000000000 8000000000000000 a000000000000000 c0000007e77fb580
NIP [c0000000000be8dc] .call_block_remove+0x12c/0x220
LR [c0000000000be880] .call_block_remove+0xd0/0x220
Call Trace:
0xc000000fb8c00240 (unreliable)
.pSeries_lpar_flush_hash_range+0x578/0x670
.flush_hash_range+0x44/0x100
.__flush_tlb_pending+0x3c/0xc0
.zap_pte_range+0x7ec/0x830
.unmap_page_range+0x3f4/0x540
.unmap_vmas+0x94/0x120
.exit_mmap+0xac/0x1f0
.mmput+0x9c/0x1f0
.do_exit+0x388/0xd60
.do_group_exit+0x54/0x100
.__se_sys_exit_group+0x14/0x20
system_call+0x5c/0x70
Instruction dump:
39400001 38a00000 4800003c 60000000 60420000 7fa9e800 38e00000 419e0014
7d29d278 7d290074 7929d182 69270001 <0b070000> 7d495378 394a0001 7fa93040
The call to H_BLOCK_REMOVE should only be made for the supported pair
of base segment page size, actual page size and using the correct
maximum block size.
Due to the required complexity in do_block_remove() and
call_block_remove(), and the fact that currently a block size of 8 is
returned by the hypervisor, we are only supporting 8 size block to the
H_BLOCK_REMOVE hcall.
In order to identify this limitation easily in the code, a local
define HBLKR_SUPPORTED_SIZE defining the currently supported block
size, and a dedicated checking helper is_supported_hlbkr() are
introduced.
For regular pages and hugetlb, the assumption is made that the page
size is equal to the base page size. For THP the page size is assumed
to be 16M.
Fixes: ba2dd8a26baa ("powerpc/pseries/mm: call H_BLOCK_REMOVE")
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190920130523.20441-3-ldufour@linux.ibm.com
2019-09-20 16:05:23 +03:00
/* Assuming THP size is 16M */
if ( is_supported_hlbkrm ( psize , MMU_PAGE_16M ) )
2018-08-20 17:29:36 +03:00
hugepage_block_invalidate ( slot , vpn , count , psize , ssize ) ;
else
hugepage_bulk_invalidate ( slot , vpn , count , psize , ssize ) ;
2013-06-20 13:00:27 +04:00
if ( lock_tlbie )
spin_unlock_irqrestore ( & pSeries_lpar_tlbie_lock , flags ) ;
}
2014-08-13 11:01:58 +04:00
static void pSeries_lpar_hugepage_invalidate ( unsigned long vsid ,
unsigned long addr ,
unsigned char * hpte_slot_array ,
2014-11-02 18:45:28 +03:00
int psize , int ssize , int local )
2013-06-20 13:00:27 +04:00
{
2014-08-13 11:01:58 +04:00
int i , index = 0 ;
2013-06-20 13:00:27 +04:00
unsigned long s_addr = addr ;
unsigned int max_hpte_count , valid ;
unsigned long vpn_array [ PPC64_HUGE_HPTE_BATCH ] ;
unsigned long slot_array [ PPC64_HUGE_HPTE_BATCH ] ;
2014-08-13 11:01:58 +04:00
unsigned long shift , hidx , vpn = 0 , hash , slot ;
2013-06-20 13:00:27 +04:00
shift = mmu_psize_defs [ psize ] . shift ;
max_hpte_count = 1U < < ( PMD_SHIFT - shift ) ;
for ( i = 0 ; i < max_hpte_count ; i + + ) {
valid = hpte_valid ( hpte_slot_array , i ) ;
if ( ! valid )
continue ;
hidx = hpte_hash_index ( hpte_slot_array , i ) ;
/* get the vpn */
addr = s_addr + ( i * ( 1ul < < shift ) ) ;
vpn = hpt_vpn ( addr , vsid , ssize ) ;
hash = hpt_hash ( vpn , shift , ssize ) ;
if ( hidx & _PTEIDX_SECONDARY )
hash = ~ hash ;
slot = ( hash & htab_hash_mask ) * HPTES_PER_GROUP ;
slot + = hidx & _PTEIDX_GROUP_IX ;
slot_array [ index ] = slot ;
vpn_array [ index ] = vpn ;
if ( index = = PPC64_HUGE_HPTE_BATCH - 1 ) {
/*
* Now do a bluk invalidate
*/
__pSeries_lpar_hugepage_invalidate ( slot_array ,
vpn_array ,
PPC64_HUGE_HPTE_BATCH ,
psize , ssize ) ;
index = 0 ;
} else
index + + ;
}
if ( index )
__pSeries_lpar_hugepage_invalidate ( slot_array , vpn_array ,
index , psize , ssize ) ;
}
2015-12-01 06:36:53 +03:00
# else
static void pSeries_lpar_hugepage_invalidate ( unsigned long vsid ,
unsigned long addr ,
unsigned char * hpte_slot_array ,
int psize , int ssize , int local )
{
WARN ( 1 , " %s called without THP support \n " , __func__ ) ;
}
# endif
2013-06-20 13:00:27 +04:00
2016-02-09 06:32:41 +03:00
static int pSeries_lpar_hpte_removebolted ( unsigned long ea ,
int psize , int ssize )
2008-01-29 01:19:24 +03:00
{
2012-09-10 06:52:50 +04:00
unsigned long vpn ;
unsigned long slot , vsid ;
2008-01-29 01:19:24 +03:00
vsid = get_kernel_vsid ( ea , ssize ) ;
2012-09-10 06:52:50 +04:00
vpn = hpt_vpn ( ea , vsid , ssize ) ;
2008-01-29 01:19:24 +03:00
2012-09-10 06:52:50 +04:00
slot = pSeries_lpar_hpte_find ( vpn , psize , ssize ) ;
2016-02-09 06:32:41 +03:00
if ( slot = = - 1 )
return - ENOENT ;
2013-06-20 13:00:13 +04:00
/*
* lpar doesn ' t use the passed actual page size
*/
pSeries_lpar_hpte_invalidate ( slot , vpn , psize , 0 , ssize , 0 ) ;
2016-02-09 06:32:41 +03:00
return 0 ;
2008-01-29 01:19:24 +03:00
}
2018-08-20 17:29:35 +03:00
static inline unsigned long compute_slot ( real_pte_t pte ,
unsigned long vpn ,
unsigned long index ,
unsigned long shift ,
int ssize )
{
unsigned long slot , hash , hidx ;
hash = hpt_hash ( vpn , shift , ssize ) ;
hidx = __rpte_to_hidx ( pte , index ) ;
if ( hidx & _PTEIDX_SECONDARY )
hash = ~ hash ;
slot = ( hash & htab_hash_mask ) * HPTES_PER_GROUP ;
slot + = hidx & _PTEIDX_GROUP_IX ;
return slot ;
}
2018-08-20 17:29:36 +03:00
/**
* The hcall H_BLOCK_REMOVE implies that the virtual pages to processed are
* " all within the same naturally aligned 8 page virtual address block " .
*/
static void do_block_remove ( unsigned long number , struct ppc64_tlb_batch * batch ,
unsigned long * param )
{
unsigned long vpn ;
unsigned long i , pix = 0 ;
unsigned long index , shift , slot , current_vpgb , vpgb ;
real_pte_t pte ;
int psize , ssize ;
psize = batch - > psize ;
ssize = batch - > ssize ;
for ( i = 0 ; i < number ; i + + ) {
vpn = batch - > vpn [ i ] ;
pte = batch - > pte [ i ] ;
pte_iterate_hashed_subpages ( pte , psize , vpn , index , shift ) {
/*
* Shifting 3 bits more on the right to get a
* 8 pages aligned virtual addresse .
*/
vpgb = ( vpn > > ( shift - VPN_SHIFT + 3 ) ) ;
if ( ! pix | | vpgb ! = current_vpgb ) {
/*
* Need to start a new 8 pages block , flush
* the current one if needed .
*/
if ( pix )
( void ) call_block_remove ( pix , param ,
true ) ;
current_vpgb = vpgb ;
param [ 0 ] = hpte_encode_avpn ( vpn , psize ,
ssize ) ;
pix = 1 ;
}
slot = compute_slot ( pte , vpn , index , shift , ssize ) ;
param [ pix + + ] = HBR_REQUEST | HBLKR_AVPN | slot ;
if ( pix = = PLPAR_HCALL9_BUFSIZE ) {
pix = call_block_remove ( pix , param , false ) ;
/*
* pix = 0 means that all the entries were
* removed , we can start a new block .
* Otherwise , this means that there are entries
* to retry , and pix points to latest one , so
* we should increment it and try to continue
* the same block .
*/
if ( pix )
pix + + ;
}
} pte_iterate_hashed_end ( ) ;
}
if ( pix )
( void ) call_block_remove ( pix , param , true ) ;
}
2019-09-20 16:05:22 +03:00
/*
* TLB Block Invalidate Characteristics
*
* These characteristics define the size of the block the hcall H_BLOCK_REMOVE
* is able to process for each couple segment base page size , actual page size .
*
* The ibm , get - system - parameter properties is returning a buffer with the
* following layout :
*
* [ 2 bytes size of the RTAS buffer ( excluding these 2 bytes ) ]
* - - - - - - - - - - - - - - - - -
* TLB Block Invalidate Specifiers :
* [ 1 byte LOG base 2 of the TLB invalidate block size being specified ]
* [ 1 byte Number of page sizes ( N ) that are supported for the specified
* TLB invalidate block size ]
* [ 1 byte Encoded segment base page size and actual page size
* MSB = 0 means 4 k segment base page size and actual page size
* MSB = 1 the penc value in mmu_psize_def ]
* . . .
* - - - - - - - - - - - - - - - - -
* Next TLB Block Invalidate Specifiers . . .
* - - - - - - - - - - - - - - - - -
* [ 0 ]
*/
static inline void set_hblkrm_bloc_size ( int bpsize , int psize ,
unsigned int block_size )
{
if ( block_size > hblkrm_size [ bpsize ] [ psize ] )
hblkrm_size [ bpsize ] [ psize ] = block_size ;
}
/*
* Decode the Encoded segment base page size and actual page size .
* PAPR specifies :
* - bit 7 is the L bit
* - bits 0 - 5 are the penc value
* If the L bit is 0 , this means 4 K segment base page size and actual page size
* otherwise the penc value should be read .
*/
# define HBLKRM_L_MASK 0x80
# define HBLKRM_PENC_MASK 0x3f
static inline void __init check_lp_set_hblkrm ( unsigned int lp ,
unsigned int block_size )
{
unsigned int bpsize , psize ;
/* First, check the L bit, if not set, this means 4K */
if ( ( lp & HBLKRM_L_MASK ) = = 0 ) {
set_hblkrm_bloc_size ( MMU_PAGE_4K , MMU_PAGE_4K , block_size ) ;
return ;
}
lp & = HBLKRM_PENC_MASK ;
for ( bpsize = 0 ; bpsize < MMU_PAGE_COUNT ; bpsize + + ) {
struct mmu_psize_def * def = & mmu_psize_defs [ bpsize ] ;
for ( psize = 0 ; psize < MMU_PAGE_COUNT ; psize + + ) {
if ( def - > penc [ psize ] = = lp ) {
set_hblkrm_bloc_size ( bpsize , psize , block_size ) ;
return ;
}
}
}
}
# define SPLPAR_TLB_BIC_TOKEN 50
/*
* The size of the TLB Block Invalidate Characteristics is variable . But at the
* maximum it will be the number of possible page sizes * 2 + 10 bytes .
* Currently MMU_PAGE_COUNT is 16 , which means 42 bytes . Use a cache line size
* ( 128 bytes ) for the buffer to get plenty of space .
*/
# define SPLPAR_TLB_BIC_MAXLENGTH 128
void __init pseries_lpar_read_hblkrm_characteristics ( void )
{
unsigned char local_buffer [ SPLPAR_TLB_BIC_MAXLENGTH ] ;
int call_status , len , idx , bpsize ;
2019-10-01 16:29:28 +03:00
if ( ! firmware_has_feature ( FW_FEATURE_BLOCK_REMOVE ) )
return ;
2019-09-20 16:05:22 +03:00
spin_lock ( & rtas_data_buf_lock ) ;
memset ( rtas_data_buf , 0 , RTAS_DATA_BUF_SIZE ) ;
call_status = rtas_call ( rtas_token ( " ibm,get-system-parameter " ) , 3 , 1 ,
NULL ,
SPLPAR_TLB_BIC_TOKEN ,
__pa ( rtas_data_buf ) ,
RTAS_DATA_BUF_SIZE ) ;
memcpy ( local_buffer , rtas_data_buf , SPLPAR_TLB_BIC_MAXLENGTH ) ;
local_buffer [ SPLPAR_TLB_BIC_MAXLENGTH - 1 ] = ' \0 ' ;
spin_unlock ( & rtas_data_buf_lock ) ;
if ( call_status ! = 0 ) {
pr_warn ( " %s %s Error calling get-system-parameter (0x%x) \n " ,
__FILE__ , __func__ , call_status ) ;
return ;
}
/*
* The first two ( 2 ) bytes of the data in the buffer are the length of
* the returned data , not counting these first two ( 2 ) bytes .
*/
len = be16_to_cpu ( * ( ( u16 * ) local_buffer ) ) + 2 ;
if ( len > SPLPAR_TLB_BIC_MAXLENGTH ) {
pr_warn ( " %s too large returned buffer %d " , __func__ , len ) ;
return ;
}
idx = 2 ;
while ( idx < len ) {
u8 block_shift = local_buffer [ idx + + ] ;
u32 block_size ;
unsigned int npsize ;
if ( ! block_shift )
break ;
block_size = 1 < < block_shift ;
for ( npsize = local_buffer [ idx + + ] ;
npsize > 0 & & idx < len ; npsize - - )
check_lp_set_hblkrm ( ( unsigned int ) local_buffer [ idx + + ] ,
block_size ) ;
}
for ( bpsize = 0 ; bpsize < MMU_PAGE_COUNT ; bpsize + + )
for ( idx = 0 ; idx < MMU_PAGE_COUNT ; idx + + )
if ( hblkrm_size [ bpsize ] [ idx ] )
pr_info ( " H_BLOCK_REMOVE supports base psize:%d psize:%d block size:%d " ,
bpsize , idx , hblkrm_size [ bpsize ] [ idx ] ) ;
}
2005-04-17 02:20:36 +04:00
/*
* Take a spinlock around flushes to avoid bouncing the hypervisor tlbie
* lock .
*/
2006-10-05 22:35:10 +04:00
static void pSeries_lpar_flush_hash_range ( unsigned long number , int local )
2005-04-17 02:20:36 +04:00
{
2012-09-10 06:52:50 +04:00
unsigned long vpn ;
2007-02-06 13:10:31 +03:00
unsigned long i , pix , rc ;
2007-02-08 07:02:35 +03:00
unsigned long flags = 0 ;
powerpc: Replace __get_cpu_var uses
This still has not been merged and now powerpc is the only arch that does
not have this change. Sorry about missing linuxppc-dev before.
V2->V2
- Fix up to work against 3.18-rc1
__get_cpu_var() is used for multiple purposes in the kernel source. One of
them is address calculation via the form &__get_cpu_var(x). This calculates
the address for the instance of the percpu variable of the current processor
based on an offset.
Other use cases are for storing and retrieving data from the current
processors percpu area. __get_cpu_var() can be used as an lvalue when
writing data or on the right side of an assignment.
__get_cpu_var() is defined as :
__get_cpu_var() always only does an address determination. However, store
and retrieve operations could use a segment prefix (or global register on
other platforms) to avoid the address calculation.
this_cpu_write() and this_cpu_read() can directly take an offset into a
percpu area and use optimized assembly code to read and write per cpu
variables.
This patch converts __get_cpu_var into either an explicit address
calculation using this_cpu_ptr() or into a use of this_cpu operations that
use the offset. Thereby address calculations are avoided and less registers
are used when code is generated.
At the end of the patch set all uses of __get_cpu_var have been removed so
the macro is removed too.
The patch set includes passes over all arches as well. Once these operations
are used throughout then specialized macros can be defined in non -x86
arches as well in order to optimize per cpu access by f.e. using a global
register that may be set to the per cpu base.
Transformations done to __get_cpu_var()
1. Determine the address of the percpu instance of the current processor.
DEFINE_PER_CPU(int, y);
int *x = &__get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(&y);
2. Same as #1 but this time an array structure is involved.
DEFINE_PER_CPU(int, y[20]);
int *x = __get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(y);
3. Retrieve the content of the current processors instance of a per cpu
variable.
DEFINE_PER_CPU(int, y);
int x = __get_cpu_var(y)
Converts to
int x = __this_cpu_read(y);
4. Retrieve the content of a percpu struct
DEFINE_PER_CPU(struct mystruct, y);
struct mystruct x = __get_cpu_var(y);
Converts to
memcpy(&x, this_cpu_ptr(&y), sizeof(x));
5. Assignment to a per cpu variable
DEFINE_PER_CPU(int, y)
__get_cpu_var(y) = x;
Converts to
__this_cpu_write(y, x);
6. Increment/Decrement etc of a per cpu variable
DEFINE_PER_CPU(int, y);
__get_cpu_var(y)++
Converts to
__this_cpu_inc(y)
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
CC: Paul Mackerras <paulus@samba.org>
Signed-off-by: Christoph Lameter <cl@linux.com>
[mpe: Fix build errors caused by set/or_softirq_pending(), and rework
assignment in __set_breakpoint() to use memcpy().]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2014-10-22 00:23:25 +04:00
struct ppc64_tlb_batch * batch = this_cpu_ptr ( & ppc64_tlb_batch ) ;
2011-04-06 23:48:50 +04:00
int lock_tlbie = ! mmu_has_feature ( MMU_FTR_LOCKLESS_TLBIE ) ;
2016-10-06 16:33:21 +03:00
unsigned long param [ PLPAR_HCALL9_BUFSIZE ] ;
2018-08-20 17:29:35 +03:00
unsigned long index , shift , slot ;
2007-02-06 13:10:31 +03:00
real_pte_t pte ;
2007-10-11 14:37:10 +04:00
int psize , ssize ;
2005-04-17 02:20:36 +04:00
if ( lock_tlbie )
spin_lock_irqsave ( & pSeries_lpar_tlbie_lock , flags ) ;
powerpc/pseries: Call H_BLOCK_REMOVE when supported
Depending on the hardware and the hypervisor, the hcall H_BLOCK_REMOVE
may not be able to process all the page sizes for a segment base page
size, as reported by the TLB Invalidate Characteristics.
For each pair of base segment page size and actual page size, this
characteristic tells us the size of the block the hcall supports.
In the case, the hcall is not supporting a pair of base segment page
size, actual page size, it is returning H_PARAM which leads to a panic
like this:
kernel BUG at /home/srikar/work/linux.git/arch/powerpc/platforms/pseries/lpar.c:466!
Oops: Exception in kernel mode, sig: 5 [#1]
BE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
CPU: 28 PID: 583 Comm: modprobe Not tainted 5.2.0-master #5
NIP: c0000000000be8dc LR: c0000000000be880 CTR: 0000000000000000
REGS: c0000007e77fb130 TRAP: 0700 Not tainted (5.2.0-master)
MSR: 8000000000029032 <SF,EE,ME,IR,DR,RI> CR: 42224824 XER: 20000000
CFAR: c0000000000be8fc IRQMASK: 0
GPR00: 0000000022224828 c0000007e77fb3c0 c000000001434d00 0000000000000005
GPR04: 9000000004fa8c00 0000000000000000 0000000000000003 0000000000000001
GPR08: c0000007e77fb450 0000000000000000 0000000000000001 ffffffffffffffff
GPR12: c0000007e77fb450 c00000000edfcb80 0000cd7d3ea30000 c0000000016022b0
GPR16: 00000000000000b0 0000cd7d3ea30000 0000000000000001 c080001f04f00105
GPR20: 0000000000000003 0000000000000004 c000000fbeb05f58 c000000001602200
GPR24: 0000000000000000 0000000000000004 8800000000000000 c000000000c5d148
GPR28: c000000000000000 8000000000000000 a000000000000000 c0000007e77fb580
NIP [c0000000000be8dc] .call_block_remove+0x12c/0x220
LR [c0000000000be880] .call_block_remove+0xd0/0x220
Call Trace:
0xc000000fb8c00240 (unreliable)
.pSeries_lpar_flush_hash_range+0x578/0x670
.flush_hash_range+0x44/0x100
.__flush_tlb_pending+0x3c/0xc0
.zap_pte_range+0x7ec/0x830
.unmap_page_range+0x3f4/0x540
.unmap_vmas+0x94/0x120
.exit_mmap+0xac/0x1f0
.mmput+0x9c/0x1f0
.do_exit+0x388/0xd60
.do_group_exit+0x54/0x100
.__se_sys_exit_group+0x14/0x20
system_call+0x5c/0x70
Instruction dump:
39400001 38a00000 4800003c 60000000 60420000 7fa9e800 38e00000 419e0014
7d29d278 7d290074 7929d182 69270001 <0b070000> 7d495378 394a0001 7fa93040
The call to H_BLOCK_REMOVE should only be made for the supported pair
of base segment page size, actual page size and using the correct
maximum block size.
Due to the required complexity in do_block_remove() and
call_block_remove(), and the fact that currently a block size of 8 is
returned by the hypervisor, we are only supporting 8 size block to the
H_BLOCK_REMOVE hcall.
In order to identify this limitation easily in the code, a local
define HBLKR_SUPPORTED_SIZE defining the currently supported block
size, and a dedicated checking helper is_supported_hlbkr() are
introduced.
For regular pages and hugetlb, the assumption is made that the page
size is equal to the base page size. For THP the page size is assumed
to be 16M.
Fixes: ba2dd8a26baa ("powerpc/pseries/mm: call H_BLOCK_REMOVE")
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190920130523.20441-3-ldufour@linux.ibm.com
2019-09-20 16:05:23 +03:00
if ( is_supported_hlbkrm ( batch - > psize , batch - > psize ) ) {
2018-08-20 17:29:36 +03:00
do_block_remove ( number , batch , param ) ;
goto out ;
}
2007-02-06 13:10:31 +03:00
psize = batch - > psize ;
2007-10-11 14:37:10 +04:00
ssize = batch - > ssize ;
2007-02-06 13:10:31 +03:00
pix = 0 ;
for ( i = 0 ; i < number ; i + + ) {
2012-09-10 06:52:50 +04:00
vpn = batch - > vpn [ i ] ;
2007-02-06 13:10:31 +03:00
pte = batch - > pte [ i ] ;
2012-09-10 06:52:50 +04:00
pte_iterate_hashed_subpages ( pte , psize , vpn , index , shift ) {
2018-08-20 17:29:35 +03:00
slot = compute_slot ( pte , vpn , index , shift , ssize ) ;
2007-02-08 07:02:35 +03:00
if ( ! firmware_has_feature ( FW_FEATURE_BULK_REMOVE ) ) {
2013-06-20 13:00:13 +04:00
/*
* lpar doesn ' t use the passed actual page size
*/
2012-09-10 06:52:50 +04:00
pSeries_lpar_hpte_invalidate ( slot , vpn , psize ,
2013-06-20 13:00:13 +04:00
0 , ssize , local ) ;
2007-02-08 07:02:35 +03:00
} else {
param [ pix ] = HBR_REQUEST | HBR_AVPN | slot ;
2012-09-10 06:52:50 +04:00
param [ pix + 1 ] = hpte_encode_avpn ( vpn , psize ,
2007-10-11 14:37:10 +04:00
ssize ) ;
2007-02-08 07:02:35 +03:00
pix + = 2 ;
if ( pix = = 8 ) {
rc = plpar_hcall9 ( H_BULK_REMOVE , param ,
2007-02-06 13:10:31 +03:00
param [ 0 ] , param [ 1 ] , param [ 2 ] ,
param [ 3 ] , param [ 4 ] , param [ 5 ] ,
param [ 6 ] , param [ 7 ] ) ;
2007-02-08 07:02:35 +03:00
BUG_ON ( rc ! = H_SUCCESS ) ;
pix = 0 ;
}
2007-02-06 13:10:31 +03:00
}
} pte_iterate_hashed_end ( ) ;
}
if ( pix ) {
param [ pix ] = HBR_END ;
rc = plpar_hcall9 ( H_BULK_REMOVE , param , param [ 0 ] , param [ 1 ] ,
param [ 2 ] , param [ 3 ] , param [ 4 ] , param [ 5 ] ,
param [ 6 ] , param [ 7 ] ) ;
BUG_ON ( rc ! = H_SUCCESS ) ;
}
2005-04-17 02:20:36 +04:00
2018-08-20 17:29:36 +03:00
out :
2005-04-17 02:20:36 +04:00
if ( lock_tlbie )
spin_unlock_irqrestore ( & pSeries_lpar_tlbie_lock , flags ) ;
}
2010-09-28 19:33:12 +04:00
static int __init disable_bulk_remove ( char * str )
{
if ( strcmp ( str , " off " ) = = 0 & &
firmware_has_feature ( FW_FEATURE_BULK_REMOVE ) ) {
2018-06-29 11:39:04 +03:00
pr_info ( " Disabling BULK_REMOVE firmware feature " ) ;
powerpc_firmware_features & = ~ FW_FEATURE_BULK_REMOVE ;
2010-09-28 19:33:12 +04:00
}
return 1 ;
}
__setup ( " bulk_remove= " , disable_bulk_remove ) ;
2016-12-09 03:07:36 +03:00
# define HPT_RESIZE_TIMEOUT 10000 /* ms */
struct hpt_resize_state {
unsigned long shift ;
int commit_rc ;
} ;
static int pseries_lpar_resize_hpt_commit ( void * data )
{
struct hpt_resize_state * state = data ;
state - > commit_rc = plpar_resize_hpt_commit ( 0 , state - > shift ) ;
if ( state - > commit_rc ! = H_SUCCESS )
return - EIO ;
/* Hypervisor has transitioned the HTAB, update our globals */
ppc64_pft_size = state - > shift ;
htab_size_bytes = 1UL < < ppc64_pft_size ;
htab_hash_mask = ( htab_size_bytes > > 7 ) - 1 ;
return 0 ;
}
powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt()
The calls to arch_add_memory()/arch_remove_memory() are always made
with the read-side cpu_hotplug_lock acquired via memory_hotplug_begin().
On pSeries, arch_add_memory()/arch_remove_memory() eventually call
resize_hpt() which in turn calls stop_machine() which acquires the
read-side cpu_hotplug_lock again, thereby resulting in the recursive
acquisition of this lock.
In the absence of CONFIG_PROVE_LOCKING, we hadn't observed a system
lockup during a memory hotplug operation because cpus_read_lock() is a
per-cpu rwsem read, which, in the fast-path (in the absence of the
writer, which in our case is a CPU-hotplug operation) simply
increments the read_count on the semaphore. Thus a recursive read in
the fast-path doesn't cause any problems.
However, we can hit this problem in practice if there is a concurrent
CPU-Hotplug operation in progress which is waiting to acquire the
write-side of the lock. This will cause the second recursive read to
block until the writer finishes. While the writer is blocked since the
first read holds the lock. Thus both the reader as well as the writers
fail to make any progress thereby blocking both CPU-Hotplug as well as
Memory Hotplug operations.
Memory-Hotplug CPU-Hotplug
CPU 0 CPU 1
------ ------
1. down_read(cpu_hotplug_lock.rw_sem)
[memory_hotplug_begin]
2. down_write(cpu_hotplug_lock.rw_sem)
[cpu_up/cpu_down]
3. down_read(cpu_hotplug_lock.rw_sem)
[stop_machine()]
Lockdep complains as follows in these code-paths.
swapper/0/1 is trying to acquire lock:
(____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: stop_machine+0x2c/0x60
but task is already holding lock:
(____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: mem_hotplug_begin+0x20/0x50
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(cpu_hotplug_lock.rw_sem);
lock(cpu_hotplug_lock.rw_sem);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by swapper/0/1:
#0: (____ptrval____) (&dev->mutex){....}, at: __driver_attach+0x12c/0x1b0
#1: (____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: mem_hotplug_begin+0x20/0x50
#2: (____ptrval____) (mem_hotplug_lock.rw_sem){++++}, at: percpu_down_write+0x54/0x1a0
stack backtrace:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.0.0-rc5-58373-gbc99402235f3-dirty #166
Call Trace:
dump_stack+0xe8/0x164 (unreliable)
__lock_acquire+0x1110/0x1c70
lock_acquire+0x240/0x290
cpus_read_lock+0x64/0xf0
stop_machine+0x2c/0x60
pseries_lpar_resize_hpt+0x19c/0x2c0
resize_hpt_for_hotplug+0x70/0xd0
arch_add_memory+0x58/0xfc
devm_memremap_pages+0x5e8/0x8f0
pmem_attach_disk+0x764/0x830
nvdimm_bus_probe+0x118/0x240
really_probe+0x230/0x4b0
driver_probe_device+0x16c/0x1e0
__driver_attach+0x148/0x1b0
bus_for_each_dev+0x90/0x130
driver_attach+0x34/0x50
bus_add_driver+0x1a8/0x360
driver_register+0x108/0x170
__nd_driver_register+0xd0/0xf0
nd_pmem_driver_init+0x34/0x48
do_one_initcall+0x1e0/0x45c
kernel_init_freeable+0x540/0x64c
kernel_init+0x2c/0x160
ret_from_kernel_thread+0x5c/0x68
Fix this issue by
1) Requiring all the calls to pseries_lpar_resize_hpt() be made
with cpu_hotplug_lock held.
2) In pseries_lpar_resize_hpt() invoke stop_machine_cpuslocked()
as a consequence of 1)
3) To satisfy 1), in hpt_order_set(), call mmu_hash_ops.resize_hpt()
with cpu_hotplug_lock held.
Fixes: dbcf929c0062 ("powerpc/pseries: Add support for hash table resizing")
Cc: stable@vger.kernel.org # v4.11+
Reported-by: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
Signed-off-by: Gautham R. Shenoy <ego@linux.vnet.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/1557906352-29048-1-git-send-email-ego@linux.vnet.ibm.com
2019-05-15 10:45:52 +03:00
/*
* Must be called in process context . The caller must hold the
* cpus_lock .
*/
2016-12-09 03:07:36 +03:00
static int pseries_lpar_resize_hpt ( unsigned long shift )
{
struct hpt_resize_state state = {
. shift = shift ,
. commit_rc = H_FUNCTION ,
} ;
unsigned int delay , total_delay = 0 ;
int rc ;
ktime_t t0 , t1 , t2 ;
might_sleep ( ) ;
if ( ! firmware_has_feature ( FW_FEATURE_HPT_RESIZE ) )
return - ENODEV ;
2018-06-29 11:39:04 +03:00
pr_info ( " Attempting to resize HPT to shift %lu \n " , shift ) ;
2016-12-09 03:07:36 +03:00
t0 = ktime_get ( ) ;
rc = plpar_resize_hpt_prepare ( 0 , shift ) ;
while ( H_IS_LONG_BUSY ( rc ) ) {
delay = get_longbusy_msecs ( rc ) ;
total_delay + = delay ;
if ( total_delay > HPT_RESIZE_TIMEOUT ) {
/* prepare with shift==0 cancels an in-progress resize */
rc = plpar_resize_hpt_prepare ( 0 , 0 ) ;
if ( rc ! = H_SUCCESS )
2018-06-29 11:39:04 +03:00
pr_warn ( " Unexpected error %d cancelling timed out HPT resize \n " ,
2016-12-09 03:07:36 +03:00
rc ) ;
return - ETIMEDOUT ;
}
msleep ( delay ) ;
rc = plpar_resize_hpt_prepare ( 0 , shift ) ;
2021-04-06 04:33:05 +03:00
}
2016-12-09 03:07:36 +03:00
switch ( rc ) {
case H_SUCCESS :
/* Continue on */
break ;
case H_PARAMETER :
2019-03-13 13:25:28 +03:00
pr_warn ( " Invalid argument from H_RESIZE_HPT_PREPARE \n " ) ;
2016-12-09 03:07:36 +03:00
return - EINVAL ;
case H_RESOURCE :
2019-03-13 13:25:28 +03:00
pr_warn ( " Operation not permitted from H_RESIZE_HPT_PREPARE \n " ) ;
2016-12-09 03:07:36 +03:00
return - EPERM ;
default :
2018-06-29 11:39:04 +03:00
pr_warn ( " Unexpected error %d from H_RESIZE_HPT_PREPARE \n " , rc ) ;
2016-12-09 03:07:36 +03:00
return - EIO ;
}
t1 = ktime_get ( ) ;
powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt()
The calls to arch_add_memory()/arch_remove_memory() are always made
with the read-side cpu_hotplug_lock acquired via memory_hotplug_begin().
On pSeries, arch_add_memory()/arch_remove_memory() eventually call
resize_hpt() which in turn calls stop_machine() which acquires the
read-side cpu_hotplug_lock again, thereby resulting in the recursive
acquisition of this lock.
In the absence of CONFIG_PROVE_LOCKING, we hadn't observed a system
lockup during a memory hotplug operation because cpus_read_lock() is a
per-cpu rwsem read, which, in the fast-path (in the absence of the
writer, which in our case is a CPU-hotplug operation) simply
increments the read_count on the semaphore. Thus a recursive read in
the fast-path doesn't cause any problems.
However, we can hit this problem in practice if there is a concurrent
CPU-Hotplug operation in progress which is waiting to acquire the
write-side of the lock. This will cause the second recursive read to
block until the writer finishes. While the writer is blocked since the
first read holds the lock. Thus both the reader as well as the writers
fail to make any progress thereby blocking both CPU-Hotplug as well as
Memory Hotplug operations.
Memory-Hotplug CPU-Hotplug
CPU 0 CPU 1
------ ------
1. down_read(cpu_hotplug_lock.rw_sem)
[memory_hotplug_begin]
2. down_write(cpu_hotplug_lock.rw_sem)
[cpu_up/cpu_down]
3. down_read(cpu_hotplug_lock.rw_sem)
[stop_machine()]
Lockdep complains as follows in these code-paths.
swapper/0/1 is trying to acquire lock:
(____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: stop_machine+0x2c/0x60
but task is already holding lock:
(____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: mem_hotplug_begin+0x20/0x50
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(cpu_hotplug_lock.rw_sem);
lock(cpu_hotplug_lock.rw_sem);
*** DEADLOCK ***
May be due to missing lock nesting notation
3 locks held by swapper/0/1:
#0: (____ptrval____) (&dev->mutex){....}, at: __driver_attach+0x12c/0x1b0
#1: (____ptrval____) (cpu_hotplug_lock.rw_sem){++++}, at: mem_hotplug_begin+0x20/0x50
#2: (____ptrval____) (mem_hotplug_lock.rw_sem){++++}, at: percpu_down_write+0x54/0x1a0
stack backtrace:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.0.0-rc5-58373-gbc99402235f3-dirty #166
Call Trace:
dump_stack+0xe8/0x164 (unreliable)
__lock_acquire+0x1110/0x1c70
lock_acquire+0x240/0x290
cpus_read_lock+0x64/0xf0
stop_machine+0x2c/0x60
pseries_lpar_resize_hpt+0x19c/0x2c0
resize_hpt_for_hotplug+0x70/0xd0
arch_add_memory+0x58/0xfc
devm_memremap_pages+0x5e8/0x8f0
pmem_attach_disk+0x764/0x830
nvdimm_bus_probe+0x118/0x240
really_probe+0x230/0x4b0
driver_probe_device+0x16c/0x1e0
__driver_attach+0x148/0x1b0
bus_for_each_dev+0x90/0x130
driver_attach+0x34/0x50
bus_add_driver+0x1a8/0x360
driver_register+0x108/0x170
__nd_driver_register+0xd0/0xf0
nd_pmem_driver_init+0x34/0x48
do_one_initcall+0x1e0/0x45c
kernel_init_freeable+0x540/0x64c
kernel_init+0x2c/0x160
ret_from_kernel_thread+0x5c/0x68
Fix this issue by
1) Requiring all the calls to pseries_lpar_resize_hpt() be made
with cpu_hotplug_lock held.
2) In pseries_lpar_resize_hpt() invoke stop_machine_cpuslocked()
as a consequence of 1)
3) To satisfy 1), in hpt_order_set(), call mmu_hash_ops.resize_hpt()
with cpu_hotplug_lock held.
Fixes: dbcf929c0062 ("powerpc/pseries: Add support for hash table resizing")
Cc: stable@vger.kernel.org # v4.11+
Reported-by: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
Signed-off-by: Gautham R. Shenoy <ego@linux.vnet.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/1557906352-29048-1-git-send-email-ego@linux.vnet.ibm.com
2019-05-15 10:45:52 +03:00
rc = stop_machine_cpuslocked ( pseries_lpar_resize_hpt_commit ,
& state , NULL ) ;
2016-12-09 03:07:36 +03:00
t2 = ktime_get ( ) ;
if ( rc ! = 0 ) {
switch ( state . commit_rc ) {
case H_PTEG_FULL :
return - ENOSPC ;
default :
2018-06-29 11:39:04 +03:00
pr_warn ( " Unexpected error %d from H_RESIZE_HPT_COMMIT \n " ,
state . commit_rc ) ;
2016-12-09 03:07:36 +03:00
return - EIO ;
} ;
}
2018-06-29 11:39:04 +03:00
pr_info ( " HPT resize to shift %lu complete (%lld ms / %lld ms) \n " ,
shift , ( long long ) ktime_ms_delta ( t1 , t0 ) ,
( long long ) ktime_ms_delta ( t2 , t1 ) ) ;
2016-12-09 03:07:36 +03:00
return 0 ;
}
2016-07-26 03:33:03 +03:00
void __init hpte_init_pseries ( void )
2005-04-17 02:20:36 +04:00
{
2016-07-05 08:03:58 +03:00
mmu_hash_ops . hpte_invalidate = pSeries_lpar_hpte_invalidate ;
mmu_hash_ops . hpte_updatepp = pSeries_lpar_hpte_updatepp ;
mmu_hash_ops . hpte_updateboltedpp = pSeries_lpar_hpte_updateboltedpp ;
mmu_hash_ops . hpte_insert = pSeries_lpar_hpte_insert ;
mmu_hash_ops . hpte_remove = pSeries_lpar_hpte_remove ;
mmu_hash_ops . hpte_removebolted = pSeries_lpar_hpte_removebolted ;
mmu_hash_ops . flush_hash_range = pSeries_lpar_flush_hash_range ;
2016-10-01 13:41:56 +03:00
mmu_hash_ops . hpte_clear_all = pseries_hpte_clear_all ;
2016-07-05 08:03:58 +03:00
mmu_hash_ops . hugepage_invalidate = pSeries_lpar_hugepage_invalidate ;
2017-03-17 08:02:35 +03:00
if ( firmware_has_feature ( FW_FEATURE_HPT_RESIZE ) )
mmu_hash_ops . resize_hpt = pseries_lpar_resize_hpt ;
2019-09-02 18:29:26 +03:00
/*
* On POWER9 , we need to do a H_REGISTER_PROC_TBL hcall
* to inform the hypervisor that we wish to use the HPT .
*/
if ( cpu_has_feature ( CPU_FTR_ARCH_300 ) )
pseries_lpar_register_process_table ( 0 , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
}
2009-04-15 09:55:32 +04:00
2020-09-17 05:06:43 +03:00
# ifdef CONFIG_PPC_RADIX_MMU
2017-01-30 13:21:36 +03:00
void radix_init_pseries ( void )
{
pr_info ( " Using radix MMU under hypervisor \n " ) ;
2019-09-02 18:29:26 +03:00
pseries_lpar_register_process_table ( __pa ( process_tb ) ,
0 , PRTB_SIZE_SHIFT - 12 ) ;
2017-01-30 13:21:36 +03:00
}
2020-09-17 05:06:43 +03:00
# endif
2017-01-30 13:21:36 +03:00
2009-04-15 09:55:32 +04:00
# ifdef CONFIG_PPC_SMLPAR
# define CMO_FREE_HINT_DEFAULT 1
static int cmo_free_hint_flag = CMO_FREE_HINT_DEFAULT ;
static int __init cmo_free_hint ( char * str )
{
char * parm ;
parm = strstrip ( str ) ;
if ( strcasecmp ( parm , " no " ) = = 0 | | strcasecmp ( parm , " off " ) = = 0 ) {
2018-06-29 11:39:04 +03:00
pr_info ( " %s: CMO free page hinting is not active. \n " , __func__ ) ;
2009-04-15 09:55:32 +04:00
cmo_free_hint_flag = 0 ;
return 1 ;
}
cmo_free_hint_flag = 1 ;
2018-06-29 11:39:04 +03:00
pr_info ( " %s: CMO free page hinting is active. \n " , __func__ ) ;
2009-04-15 09:55:32 +04:00
if ( strcasecmp ( parm , " yes " ) = = 0 | | strcasecmp ( parm , " on " ) = = 0 )
return 1 ;
return 0 ;
}
__setup ( " cmo_free_hint= " , cmo_free_hint ) ;
static void pSeries_set_page_state ( struct page * page , int order ,
unsigned long state )
{
int i , j ;
unsigned long cmo_page_sz , addr ;
cmo_page_sz = cmo_get_page_size ( ) ;
addr = __pa ( ( unsigned long ) page_address ( page ) ) ;
for ( i = 0 ; i < ( 1 < < order ) ; i + + , addr + = PAGE_SIZE ) {
for ( j = 0 ; j < PAGE_SIZE ; j + = cmo_page_sz )
plpar_hcall_norets ( H_PAGE_INIT , state , addr + j , 0 ) ;
}
}
void arch_free_page ( struct page * page , int order )
{
2016-04-29 16:26:08 +03:00
if ( radix_enabled ( ) )
return ;
2009-04-15 09:55:32 +04:00
if ( ! cmo_free_hint_flag | | ! firmware_has_feature ( FW_FEATURE_CMO ) )
return ;
pSeries_set_page_state ( page , order , H_PAGE_SET_UNUSED ) ;
}
EXPORT_SYMBOL ( arch_free_page ) ;
2016-04-29 16:26:08 +03:00
# endif /* CONFIG_PPC_SMLPAR */
2017-10-19 07:08:43 +03:00
# endif /* CONFIG_PPC_BOOK3S_64 */
2009-10-26 21:50:29 +03:00
# ifdef CONFIG_TRACEPOINTS
2018-12-30 18:14:15 +03:00
# ifdef CONFIG_JUMP_LABEL
2014-07-03 09:52:03 +04:00
struct static_key hcall_tracepoint_key = STATIC_KEY_INIT ;
2016-11-28 21:03:21 +03:00
int hcall_tracepoint_regfunc ( void )
2014-07-03 09:52:03 +04:00
{
static_key_slow_inc ( & hcall_tracepoint_key ) ;
2016-11-28 21:03:21 +03:00
return 0 ;
2014-07-03 09:52:03 +04:00
}
void hcall_tracepoint_unregfunc ( void )
{
static_key_slow_dec ( & hcall_tracepoint_key ) ;
}
# else
2009-10-26 21:50:29 +03:00
/*
* We optimise our hcall path by placing hcall_tracepoint_refcount
* directly in the TOC so we can check if the hcall tracepoints are
* enabled via a single load .
*/
/* NB: reg/unreg are called while guarded with the tracepoints_mutex */
extern long hcall_tracepoint_refcount ;
2016-11-28 21:03:21 +03:00
int hcall_tracepoint_regfunc ( void )
2009-10-26 21:50:29 +03:00
{
hcall_tracepoint_refcount + + ;
2016-11-28 21:03:21 +03:00
return 0 ;
2009-10-26 21:50:29 +03:00
}
void hcall_tracepoint_unregfunc ( void )
{
hcall_tracepoint_refcount - - ;
}
2014-07-03 09:52:03 +04:00
# endif
/*
2021-05-08 13:14:55 +03:00
* Keep track of hcall tracing depth and prevent recursion . Warn if any is
* detected because it may indicate a problem . This will not catch all
* problems with tracing code making hcalls , because the tracing might have
* been invoked from a non - hcall , so the first hcall could recurse into it
* without warning here , but this better than nothing .
*
* Hcalls with specific problems being traced should use the _notrace
* plpar_hcall variants .
2014-07-03 09:52:03 +04:00
*/
static DEFINE_PER_CPU ( unsigned int , hcall_trace_depth ) ;
2009-10-26 21:50:29 +03:00
2021-05-08 13:14:53 +03:00
notrace void __trace_hcall_entry ( unsigned long opcode , unsigned long * args )
2009-10-26 21:50:29 +03:00
{
2010-10-21 04:52:12 +04:00
unsigned long flags ;
unsigned int * depth ;
local_irq_save ( flags ) ;
powerpc: Replace __get_cpu_var uses
This still has not been merged and now powerpc is the only arch that does
not have this change. Sorry about missing linuxppc-dev before.
V2->V2
- Fix up to work against 3.18-rc1
__get_cpu_var() is used for multiple purposes in the kernel source. One of
them is address calculation via the form &__get_cpu_var(x). This calculates
the address for the instance of the percpu variable of the current processor
based on an offset.
Other use cases are for storing and retrieving data from the current
processors percpu area. __get_cpu_var() can be used as an lvalue when
writing data or on the right side of an assignment.
__get_cpu_var() is defined as :
__get_cpu_var() always only does an address determination. However, store
and retrieve operations could use a segment prefix (or global register on
other platforms) to avoid the address calculation.
this_cpu_write() and this_cpu_read() can directly take an offset into a
percpu area and use optimized assembly code to read and write per cpu
variables.
This patch converts __get_cpu_var into either an explicit address
calculation using this_cpu_ptr() or into a use of this_cpu operations that
use the offset. Thereby address calculations are avoided and less registers
are used when code is generated.
At the end of the patch set all uses of __get_cpu_var have been removed so
the macro is removed too.
The patch set includes passes over all arches as well. Once these operations
are used throughout then specialized macros can be defined in non -x86
arches as well in order to optimize per cpu access by f.e. using a global
register that may be set to the per cpu base.
Transformations done to __get_cpu_var()
1. Determine the address of the percpu instance of the current processor.
DEFINE_PER_CPU(int, y);
int *x = &__get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(&y);
2. Same as #1 but this time an array structure is involved.
DEFINE_PER_CPU(int, y[20]);
int *x = __get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(y);
3. Retrieve the content of the current processors instance of a per cpu
variable.
DEFINE_PER_CPU(int, y);
int x = __get_cpu_var(y)
Converts to
int x = __this_cpu_read(y);
4. Retrieve the content of a percpu struct
DEFINE_PER_CPU(struct mystruct, y);
struct mystruct x = __get_cpu_var(y);
Converts to
memcpy(&x, this_cpu_ptr(&y), sizeof(x));
5. Assignment to a per cpu variable
DEFINE_PER_CPU(int, y)
__get_cpu_var(y) = x;
Converts to
__this_cpu_write(y, x);
6. Increment/Decrement etc of a per cpu variable
DEFINE_PER_CPU(int, y);
__get_cpu_var(y)++
Converts to
__this_cpu_inc(y)
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
CC: Paul Mackerras <paulus@samba.org>
Signed-off-by: Christoph Lameter <cl@linux.com>
[mpe: Fix build errors caused by set/or_softirq_pending(), and rework
assignment in __set_breakpoint() to use memcpy().]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2014-10-22 00:23:25 +04:00
depth = this_cpu_ptr ( & hcall_trace_depth ) ;
2010-10-21 04:52:12 +04:00
2021-05-08 13:14:55 +03:00
if ( WARN_ON_ONCE ( * depth ) )
2010-10-21 04:52:12 +04:00
goto out ;
( * depth ) + + ;
2011-12-18 20:03:04 +04:00
preempt_disable ( ) ;
2009-10-26 21:51:09 +03:00
trace_hcall_entry ( opcode , args ) ;
2010-10-21 04:52:12 +04:00
( * depth ) - - ;
out :
local_irq_restore ( flags ) ;
2009-10-26 21:50:29 +03:00
}
2021-05-08 13:14:53 +03:00
notrace void __trace_hcall_exit ( long opcode , long retval , unsigned long * retbuf )
2009-10-26 21:50:29 +03:00
{
2010-10-21 04:52:12 +04:00
unsigned long flags ;
unsigned int * depth ;
local_irq_save ( flags ) ;
powerpc: Replace __get_cpu_var uses
This still has not been merged and now powerpc is the only arch that does
not have this change. Sorry about missing linuxppc-dev before.
V2->V2
- Fix up to work against 3.18-rc1
__get_cpu_var() is used for multiple purposes in the kernel source. One of
them is address calculation via the form &__get_cpu_var(x). This calculates
the address for the instance of the percpu variable of the current processor
based on an offset.
Other use cases are for storing and retrieving data from the current
processors percpu area. __get_cpu_var() can be used as an lvalue when
writing data or on the right side of an assignment.
__get_cpu_var() is defined as :
__get_cpu_var() always only does an address determination. However, store
and retrieve operations could use a segment prefix (or global register on
other platforms) to avoid the address calculation.
this_cpu_write() and this_cpu_read() can directly take an offset into a
percpu area and use optimized assembly code to read and write per cpu
variables.
This patch converts __get_cpu_var into either an explicit address
calculation using this_cpu_ptr() or into a use of this_cpu operations that
use the offset. Thereby address calculations are avoided and less registers
are used when code is generated.
At the end of the patch set all uses of __get_cpu_var have been removed so
the macro is removed too.
The patch set includes passes over all arches as well. Once these operations
are used throughout then specialized macros can be defined in non -x86
arches as well in order to optimize per cpu access by f.e. using a global
register that may be set to the per cpu base.
Transformations done to __get_cpu_var()
1. Determine the address of the percpu instance of the current processor.
DEFINE_PER_CPU(int, y);
int *x = &__get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(&y);
2. Same as #1 but this time an array structure is involved.
DEFINE_PER_CPU(int, y[20]);
int *x = __get_cpu_var(y);
Converts to
int *x = this_cpu_ptr(y);
3. Retrieve the content of the current processors instance of a per cpu
variable.
DEFINE_PER_CPU(int, y);
int x = __get_cpu_var(y)
Converts to
int x = __this_cpu_read(y);
4. Retrieve the content of a percpu struct
DEFINE_PER_CPU(struct mystruct, y);
struct mystruct x = __get_cpu_var(y);
Converts to
memcpy(&x, this_cpu_ptr(&y), sizeof(x));
5. Assignment to a per cpu variable
DEFINE_PER_CPU(int, y)
__get_cpu_var(y) = x;
Converts to
__this_cpu_write(y, x);
6. Increment/Decrement etc of a per cpu variable
DEFINE_PER_CPU(int, y);
__get_cpu_var(y)++
Converts to
__this_cpu_inc(y)
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
CC: Paul Mackerras <paulus@samba.org>
Signed-off-by: Christoph Lameter <cl@linux.com>
[mpe: Fix build errors caused by set/or_softirq_pending(), and rework
assignment in __set_breakpoint() to use memcpy().]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2014-10-22 00:23:25 +04:00
depth = this_cpu_ptr ( & hcall_trace_depth ) ;
2010-10-21 04:52:12 +04:00
2021-05-08 13:14:55 +03:00
if ( * depth ) /* Don't warn again on the way out */
2010-10-21 04:52:12 +04:00
goto out ;
( * depth ) + + ;
2009-10-26 21:51:09 +03:00
trace_hcall_exit ( opcode , retval , retbuf ) ;
2011-12-18 20:03:04 +04:00
preempt_enable ( ) ;
2010-10-21 04:52:12 +04:00
( * depth ) - - ;
out :
local_irq_restore ( flags ) ;
2009-10-26 21:50:29 +03:00
}
# endif
2011-05-04 10:01:20 +04:00
/**
* h_get_mpp
* H_GET_MPP hcall returns info in 7 parms
*/
int h_get_mpp ( struct hvcall_mpp_data * mpp_data )
{
int rc ;
unsigned long retbuf [ PLPAR_HCALL9_BUFSIZE ] ;
rc = plpar_hcall9 ( H_GET_MPP , retbuf ) ;
mpp_data - > entitled_mem = retbuf [ 0 ] ;
mpp_data - > mapped_mem = retbuf [ 1 ] ;
mpp_data - > group_num = ( retbuf [ 2 ] > > 2 * 8 ) & 0xffff ;
mpp_data - > pool_num = retbuf [ 2 ] & 0xffff ;
mpp_data - > mem_weight = ( retbuf [ 3 ] > > 7 * 8 ) & 0xff ;
mpp_data - > unallocated_mem_weight = ( retbuf [ 3 ] > > 6 * 8 ) & 0xff ;
2013-08-06 20:01:24 +04:00
mpp_data - > unallocated_entitlement = retbuf [ 3 ] & 0xffffffffffffUL ;
2011-05-04 10:01:20 +04:00
mpp_data - > pool_size = retbuf [ 4 ] ;
mpp_data - > loan_request = retbuf [ 5 ] ;
mpp_data - > backing_mem = retbuf [ 6 ] ;
return rc ;
}
EXPORT_SYMBOL ( h_get_mpp ) ;
int h_get_mpp_x ( struct hvcall_mpp_x_data * mpp_x_data )
{
int rc ;
unsigned long retbuf [ PLPAR_HCALL9_BUFSIZE ] = { 0 } ;
rc = plpar_hcall9 ( H_GET_MPP_X , retbuf ) ;
mpp_x_data - > coalesced_bytes = retbuf [ 0 ] ;
mpp_x_data - > pool_coalesced_bytes = retbuf [ 1 ] ;
mpp_x_data - > pool_purr_cycles = retbuf [ 2 ] ;
mpp_x_data - > pool_spurr_cycles = retbuf [ 3 ] ;
return rc ;
}
2017-03-22 06:37:00 +03:00
static unsigned long vsid_unscramble ( unsigned long vsid , int ssize )
{
unsigned long protovsid ;
unsigned long va_bits = VA_BITS ;
unsigned long modinv , vsid_modulus ;
unsigned long max_mod_inv , tmp_modinv ;
if ( ! mmu_has_feature ( MMU_FTR_68_BIT_VA ) )
va_bits = 65 ;
if ( ssize = = MMU_SEGSIZE_256M ) {
modinv = VSID_MULINV_256M ;
vsid_modulus = ( ( 1UL < < ( va_bits - SID_SHIFT ) ) - 1 ) ;
} else {
modinv = VSID_MULINV_1T ;
vsid_modulus = ( ( 1UL < < ( va_bits - SID_SHIFT_1T ) ) - 1 ) ;
}
/*
* vsid outside our range .
*/
if ( vsid > = vsid_modulus )
return 0 ;
/*
* If modinv is the modular multiplicate inverse of ( x % vsid_modulus )
* and vsid = ( protovsid * x ) % vsid_modulus , then we say :
* protovsid = ( vsid * modinv ) % vsid_modulus
*/
/* Check if (vsid * modinv) overflow (63 bits) */
max_mod_inv = 0x7fffffffffffffffull / vsid ;
if ( modinv < max_mod_inv )
return ( vsid * modinv ) % vsid_modulus ;
tmp_modinv = modinv / max_mod_inv ;
modinv % = max_mod_inv ;
protovsid = ( ( ( vsid * max_mod_inv ) % vsid_modulus ) * tmp_modinv ) % vsid_modulus ;
protovsid = ( protovsid + vsid * modinv ) % vsid_modulus ;
return protovsid ;
}
static int __init reserve_vrma_context_id ( void )
{
unsigned long protovsid ;
/*
* Reserve context ids which map to reserved virtual addresses . For now
* we only reserve the context id which maps to the VRMA VSID . We ignore
* the addresses in " ibm,adjunct-virtual-addresses " because we don ' t
* enable adjunct support via the " ibm,client-architecture-support "
* interface .
*/
protovsid = vsid_unscramble ( VRMA_VSID , MMU_SEGSIZE_1T ) ;
hash__reserve_context_id ( protovsid > > ESID_BITS_1T ) ;
return 0 ;
}
machine_device_initcall ( pseries , reserve_vrma_context_id ) ;
2018-10-16 14:50:05 +03:00
# ifdef CONFIG_DEBUG_FS
/* debugfs file interface for vpa data */
static ssize_t vpa_file_read ( struct file * filp , char __user * buf , size_t len ,
loff_t * pos )
{
int cpu = ( long ) filp - > private_data ;
struct lppaca * lppaca = & lppaca_of ( cpu ) ;
return simple_read_from_buffer ( buf , len , pos , lppaca ,
sizeof ( struct lppaca ) ) ;
}
static const struct file_operations vpa_fops = {
. open = simple_open ,
. read = vpa_file_read ,
. llseek = default_llseek ,
} ;
static int __init vpa_debugfs_init ( void )
{
char name [ 16 ] ;
long i ;
2019-02-18 15:56:44 +03:00
struct dentry * vpa_dir ;
2018-10-16 14:50:05 +03:00
if ( ! firmware_has_feature ( FW_FEATURE_SPLPAR ) )
return 0 ;
2021-08-12 16:28:31 +03:00
vpa_dir = debugfs_create_dir ( " vpa " , arch_debugfs_dir ) ;
2018-10-16 14:50:05 +03:00
/* set up the per-cpu vpa file*/
for_each_possible_cpu ( i ) {
sprintf ( name , " cpu-%ld " , i ) ;
2019-10-14 13:16:42 +03:00
debugfs_create_file ( name , 0400 , vpa_dir , ( void * ) i , & vpa_fops ) ;
2018-10-16 14:50:05 +03:00
}
return 0 ;
}
machine_arch_initcall ( pseries , vpa_debugfs_init ) ;
# endif /* CONFIG_DEBUG_FS */