blob: efbd54cc4e696b5c78f56f7db46d5bb605df40e9 [file] [log] [blame]
Thomas Gleixner2025cf92019-05-29 07:18:02 -07001// SPDX-License-Identifier: GPL-2.0-only
Tony Luck60ec2442016-10-28 15:04:47 -07002/*
3 * Resource Director Technology(RDT)
4 * - Cache Allocation code.
5 *
6 * Copyright (C) 2016 Intel Corporation
7 *
8 * Authors:
9 * Fenghua Yu <fenghua.yu@intel.com>
10 * Tony Luck <tony.luck@intel.com>
11 *
Tony Luck60ec2442016-10-28 15:04:47 -070012 * More information about RDT be found in the Intel (R) x86 Architecture
13 * Software Developer Manual June 2016, volume 3, section 17.17.
14 */
15
16#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
17
Reinette Chatre80b71c32018-12-10 13:21:54 -080018#include <linux/cpu.h>
Tony Luck60ec2442016-10-28 15:04:47 -070019#include <linux/kernfs.h>
20#include <linux/seq_file.h>
21#include <linux/slab.h>
Babu Mogerfa7d9492018-11-21 20:28:25 +000022#include "internal.h"
Tony Luck60ec2442016-10-28 15:04:47 -070023
24/*
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070025 * Check whether MBA bandwidth percentage value is correct. The value is
Babu Moger4d05bf72018-11-21 20:28:45 +000026 * checked against the minimum and maximum bandwidth values specified by
27 * the hardware. The allocated bandwidth percentage is rounded to the next
28 * control step available on the hardware.
29 */
30static bool bw_validate_amd(char *buf, unsigned long *data,
31 struct rdt_resource *r)
32{
33 unsigned long bw;
34 int ret;
35
36 ret = kstrtoul(buf, 10, &bw);
37 if (ret) {
38 rdt_last_cmd_printf("Non-decimal digit in MB value %s\n", buf);
39 return false;
40 }
41
42 if (bw < r->membw.min_bw || bw > r->default_ctrl) {
43 rdt_last_cmd_printf("MB value %ld out of range [%d,%d]\n", bw,
44 r->membw.min_bw, r->default_ctrl);
45 return false;
46 }
47
48 *data = roundup(bw, (unsigned long)r->membw.bw_gran);
49 return true;
50}
51
52int parse_bw_amd(struct rdt_parse_data *data, struct rdt_resource *r,
53 struct rdt_domain *d)
54{
55 unsigned long bw_val;
56
57 if (d->have_new_ctrl) {
58 rdt_last_cmd_printf("Duplicate domain %d\n", d->id);
59 return -EINVAL;
60 }
61
62 if (!bw_validate_amd(data->buf, &bw_val, r))
63 return -EINVAL;
64
65 d->new_ctrl = bw_val;
66 d->have_new_ctrl = true;
67
68 return 0;
69}
Tony Luck60ec2442016-10-28 15:04:47 -070070
71/*
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070072 * Check whether MBA bandwidth percentage value is correct. The value is
73 * checked against the minimum and max bandwidth values specified by the
74 * hardware. The allocated bandwidth percentage is rounded to the next
75 * control step available on the hardware.
76 */
77static bool bw_validate(char *buf, unsigned long *data, struct rdt_resource *r)
78{
79 unsigned long bw;
80 int ret;
81
82 /*
83 * Only linear delay values is supported for current Intel SKUs.
84 */
Tony Luckc377dcf2017-09-25 16:39:34 -070085 if (!r->membw.delay_linear) {
86 rdt_last_cmd_puts("No support for non-linear MB domains\n");
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070087 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -070088 }
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070089
90 ret = kstrtoul(buf, 10, &bw);
Tony Luckc377dcf2017-09-25 16:39:34 -070091 if (ret) {
92 rdt_last_cmd_printf("Non-decimal digit in MB value %s\n", buf);
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070093 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -070094 }
Vikas Shivappa64e8ed32017-04-07 17:33:57 -070095
Vikas Shivappa8205a072018-04-20 15:36:19 -070096 if ((bw < r->membw.min_bw || bw > r->default_ctrl) &&
97 !is_mba_sc(r)) {
Tony Luckc377dcf2017-09-25 16:39:34 -070098 rdt_last_cmd_printf("MB value %ld out of range [%d,%d]\n", bw,
99 r->membw.min_bw, r->default_ctrl);
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700100 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -0700101 }
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700102
103 *data = roundup(bw, (unsigned long)r->membw.bw_gran);
104 return true;
105}
106
Babu Moger1ad4fa42018-11-21 20:28:33 +0000107int parse_bw_intel(struct rdt_parse_data *data, struct rdt_resource *r,
108 struct rdt_domain *d)
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700109{
Xiaochen Shen753694a2018-09-15 14:58:19 -0700110 unsigned long bw_val;
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700111
Tony Luckc377dcf2017-09-25 16:39:34 -0700112 if (d->have_new_ctrl) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000113 rdt_last_cmd_printf("Duplicate domain %d\n", d->id);
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700114 return -EINVAL;
Tony Luckc377dcf2017-09-25 16:39:34 -0700115 }
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700116
Xiaochen Shen753694a2018-09-15 14:58:19 -0700117 if (!bw_validate(data->buf, &bw_val, r))
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700118 return -EINVAL;
Xiaochen Shen753694a2018-09-15 14:58:19 -0700119 d->new_ctrl = bw_val;
Vikas Shivappa64e8ed32017-04-07 17:33:57 -0700120 d->have_new_ctrl = true;
121
122 return 0;
123}
124
125/*
Tony Luck60ec2442016-10-28 15:04:47 -0700126 * Check whether a cache bit mask is valid. The SDM says:
127 * Please note that all (and only) contiguous '1' combinations
128 * are allowed (e.g. FFFFH, 0FF0H, 003CH, etc.).
129 * Additionally Haswell requires at least two bits set.
130 */
Babu Mogera36c5ff2018-11-21 20:28:35 +0000131bool cbm_validate_intel(char *buf, u32 *data, struct rdt_resource *r)
Tony Luck60ec2442016-10-28 15:04:47 -0700132{
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700133 unsigned long first_bit, zero_bit, val;
Thomas Gleixnerd3e11b42017-04-14 13:00:36 +0200134 unsigned int cbm_len = r->cache.cbm_len;
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700135 int ret;
Tony Luck60ec2442016-10-28 15:04:47 -0700136
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700137 ret = kstrtoul(buf, 16, &val);
Tony Luckc377dcf2017-09-25 16:39:34 -0700138 if (ret) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000139 rdt_last_cmd_printf("Non-hex character in the mask %s\n", buf);
Tony Luck60ec2442016-10-28 15:04:47 -0700140 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -0700141 }
Tony Luck60ec2442016-10-28 15:04:47 -0700142
Tony Luckc377dcf2017-09-25 16:39:34 -0700143 if (val == 0 || val > r->default_ctrl) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000144 rdt_last_cmd_puts("Mask out of range\n");
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700145 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -0700146 }
Tony Luck60ec2442016-10-28 15:04:47 -0700147
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700148 first_bit = find_first_bit(&val, cbm_len);
149 zero_bit = find_next_zero_bit(&val, cbm_len, first_bit);
150
Tony Luckc377dcf2017-09-25 16:39:34 -0700151 if (find_next_bit(&val, cbm_len, zero_bit) < cbm_len) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000152 rdt_last_cmd_printf("The mask %lx has non-consecutive 1-bits\n", val);
Tony Luck60ec2442016-10-28 15:04:47 -0700153 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -0700154 }
Tony Luck60ec2442016-10-28 15:04:47 -0700155
Tony Luckc377dcf2017-09-25 16:39:34 -0700156 if ((zero_bit - first_bit) < r->cache.min_cbm_bits) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000157 rdt_last_cmd_printf("Need at least %d bits in the mask\n",
Tony Luckc377dcf2017-09-25 16:39:34 -0700158 r->cache.min_cbm_bits);
Tony Luck60ec2442016-10-28 15:04:47 -0700159 return false;
Tony Luckc377dcf2017-09-25 16:39:34 -0700160 }
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700161
162 *data = val;
Tony Luck60ec2442016-10-28 15:04:47 -0700163 return true;
164}
165
166/*
Babu Moger4d05bf72018-11-21 20:28:45 +0000167 * Check whether a cache bit mask is valid. AMD allows non-contiguous
168 * bitmasks
169 */
170bool cbm_validate_amd(char *buf, u32 *data, struct rdt_resource *r)
171{
172 unsigned long val;
173 int ret;
174
175 ret = kstrtoul(buf, 16, &val);
176 if (ret) {
177 rdt_last_cmd_printf("Non-hex character in the mask %s\n", buf);
178 return false;
179 }
180
181 if (val > r->default_ctrl) {
182 rdt_last_cmd_puts("Mask out of range\n");
183 return false;
184 }
185
186 *data = val;
187 return true;
188}
189
190/*
Tony Luck60ec2442016-10-28 15:04:47 -0700191 * Read one cache bit mask (hex). Check that it is valid for the current
192 * resource type.
193 */
Xiaochen Shen753694a2018-09-15 14:58:19 -0700194int parse_cbm(struct rdt_parse_data *data, struct rdt_resource *r,
195 struct rdt_domain *d)
Tony Luck60ec2442016-10-28 15:04:47 -0700196{
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700197 struct rdtgroup *rdtgrp = data->rdtgrp;
Reinette Chatre9af4c0a2018-06-22 15:42:02 -0700198 u32 cbm_val;
Tony Luck60ec2442016-10-28 15:04:47 -0700199
Tony Luckc377dcf2017-09-25 16:39:34 -0700200 if (d->have_new_ctrl) {
Babu Moger723f1a0d2018-11-21 20:28:43 +0000201 rdt_last_cmd_printf("Duplicate domain %d\n", d->id);
Tony Luckc4026b7b2017-04-03 14:44:16 -0700202 return -EINVAL;
Tony Luckc377dcf2017-09-25 16:39:34 -0700203 }
Tony Luckc4026b7b2017-04-03 14:44:16 -0700204
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700205 /*
206 * Cannot set up more than one pseudo-locked region in a cache
207 * hierarchy.
208 */
209 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP &&
210 rdtgroup_pseudo_locked_in_hierarchy(d)) {
Reinette Chatre456824892018-11-27 11:19:36 -0800211 rdt_last_cmd_puts("Pseudo-locked region in hierarchy\n");
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700212 return -EINVAL;
213 }
214
Babu Mogercb746352018-11-28 22:42:47 +0000215 if (!r->cbm_validate(data->buf, &cbm_val, r))
Tony Luck60ec2442016-10-28 15:04:47 -0700216 return -EINVAL;
Reinette Chatre9af4c0a2018-06-22 15:42:02 -0700217
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700218 if ((rdtgrp->mode == RDT_MODE_EXCLUSIVE ||
219 rdtgrp->mode == RDT_MODE_SHAREABLE) &&
220 rdtgroup_cbm_overlaps_pseudo_locked(d, cbm_val)) {
Reinette Chatre456824892018-11-27 11:19:36 -0800221 rdt_last_cmd_puts("CBM overlaps with pseudo-locked region\n");
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700222 return -EINVAL;
223 }
224
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700225 /*
226 * The CBM may not overlap with the CBM of another closid if
227 * either is exclusive.
228 */
229 if (rdtgroup_cbm_overlaps(r, d, cbm_val, rdtgrp->closid, true)) {
Reinette Chatre456824892018-11-27 11:19:36 -0800230 rdt_last_cmd_puts("Overlaps with exclusive group\n");
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700231 return -EINVAL;
232 }
233
234 if (rdtgroup_cbm_overlaps(r, d, cbm_val, rdtgrp->closid, false)) {
Reinette Chatredfe96742018-06-22 15:42:17 -0700235 if (rdtgrp->mode == RDT_MODE_EXCLUSIVE ||
236 rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP) {
Reinette Chatre456824892018-11-27 11:19:36 -0800237 rdt_last_cmd_puts("Overlaps with other group\n");
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700238 return -EINVAL;
239 }
240 }
241
Reinette Chatre9af4c0a2018-06-22 15:42:02 -0700242 d->new_ctrl = cbm_val;
Vikas Shivappa2545e9f2017-04-07 17:33:51 -0700243 d->have_new_ctrl = true;
Tony Luck60ec2442016-10-28 15:04:47 -0700244
245 return 0;
246}
247
248/*
249 * For each domain in this resource we expect to find a series of:
250 * id=mask
Tony Luckc4026b7b2017-04-03 14:44:16 -0700251 * separated by ";". The "id" is in decimal, and must match one of
252 * the "id"s for this resource.
Tony Luck60ec2442016-10-28 15:04:47 -0700253 */
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700254static int parse_line(char *line, struct rdt_resource *r,
255 struct rdtgroup *rdtgrp)
Tony Luck60ec2442016-10-28 15:04:47 -0700256{
Xiaochen Shen753694a2018-09-15 14:58:19 -0700257 struct rdt_parse_data data;
Tony Luck60ec2442016-10-28 15:04:47 -0700258 char *dom = NULL, *id;
259 struct rdt_domain *d;
260 unsigned long dom_id;
261
Reinette Chatre32d736a2018-09-15 14:58:24 -0700262 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP &&
263 r->rid == RDT_RESOURCE_MBA) {
264 rdt_last_cmd_puts("Cannot pseudo-lock MBA resource\n");
265 return -EINVAL;
266 }
267
Tony Luckc4026b7b2017-04-03 14:44:16 -0700268next:
269 if (!line || line[0] == '\0')
270 return 0;
271 dom = strsep(&line, ";");
272 id = strsep(&dom, "=");
Tony Luckc377dcf2017-09-25 16:39:34 -0700273 if (!dom || kstrtoul(id, 10, &dom_id)) {
274 rdt_last_cmd_puts("Missing '=' or non-numeric domain\n");
Tony Luck60ec2442016-10-28 15:04:47 -0700275 return -EINVAL;
Tony Luckc377dcf2017-09-25 16:39:34 -0700276 }
Vikas Shivappa634b0e02017-04-19 16:50:03 -0700277 dom = strim(dom);
Tony Luckc4026b7b2017-04-03 14:44:16 -0700278 list_for_each_entry(d, &r->domains, list) {
279 if (d->id == dom_id) {
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700280 data.buf = dom;
281 data.rdtgrp = rdtgrp;
282 if (r->parse_ctrlval(&data, r, d))
Tony Luckc4026b7b2017-04-03 14:44:16 -0700283 return -EINVAL;
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700284 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP) {
285 /*
286 * In pseudo-locking setup mode and just
287 * parsed a valid CBM that should be
288 * pseudo-locked. Only one locked region per
289 * resource group and domain so just do
290 * the required initialization for single
291 * region and return.
292 */
293 rdtgrp->plr->r = r;
294 rdtgrp->plr->d = d;
295 rdtgrp->plr->cbm = d->new_ctrl;
296 d->plr = rdtgrp->plr;
297 return 0;
298 }
Tony Luckc4026b7b2017-04-03 14:44:16 -0700299 goto next;
300 }
301 }
302 return -EINVAL;
Tony Luck60ec2442016-10-28 15:04:47 -0700303}
304
Reinette Chatre024d15b2018-06-22 15:41:58 -0700305int update_domains(struct rdt_resource *r, int closid)
Tony Luck60ec2442016-10-28 15:04:47 -0700306{
307 struct msr_param msr_param;
308 cpumask_var_t cpu_mask;
309 struct rdt_domain *d;
Vikas Shivappa8205a072018-04-20 15:36:19 -0700310 bool mba_sc;
311 u32 *dc;
Tony Luckc4026b7b2017-04-03 14:44:16 -0700312 int cpu;
Tony Luck60ec2442016-10-28 15:04:47 -0700313
314 if (!zalloc_cpumask_var(&cpu_mask, GFP_KERNEL))
315 return -ENOMEM;
316
317 msr_param.low = closid;
318 msr_param.high = msr_param.low + 1;
319 msr_param.res = r;
320
Vikas Shivappa8205a072018-04-20 15:36:19 -0700321 mba_sc = is_mba_sc(r);
Tony Luck60ec2442016-10-28 15:04:47 -0700322 list_for_each_entry(d, &r->domains, list) {
Vikas Shivappa8205a072018-04-20 15:36:19 -0700323 dc = !mba_sc ? d->ctrl_val : d->mbps_val;
324 if (d->have_new_ctrl && d->new_ctrl != dc[closid]) {
Tony Luckc4026b7b2017-04-03 14:44:16 -0700325 cpumask_set_cpu(cpumask_any(&d->cpu_mask), cpu_mask);
Vikas Shivappa8205a072018-04-20 15:36:19 -0700326 dc[closid] = d->new_ctrl;
Tony Luckc4026b7b2017-04-03 14:44:16 -0700327 }
Tony Luck60ec2442016-10-28 15:04:47 -0700328 }
Vikas Shivappa8205a072018-04-20 15:36:19 -0700329
330 /*
331 * Avoid writing the control msr with control values when
332 * MBA software controller is enabled
333 */
334 if (cpumask_empty(cpu_mask) || mba_sc)
Tony Luckc4026b7b2017-04-03 14:44:16 -0700335 goto done;
Tony Luck60ec2442016-10-28 15:04:47 -0700336 cpu = get_cpu();
Xiaochen Shen47820e72019-04-17 19:08:49 +0800337 /* Update resource control msr on this CPU if it's in cpu_mask. */
Tony Luck60ec2442016-10-28 15:04:47 -0700338 if (cpumask_test_cpu(cpu, cpu_mask))
Vikas Shivappa2545e9f2017-04-07 17:33:51 -0700339 rdt_ctrl_update(&msr_param);
Xiaochen Shen47820e72019-04-17 19:08:49 +0800340 /* Update resource control msr on other CPUs. */
Vikas Shivappa2545e9f2017-04-07 17:33:51 -0700341 smp_call_function_many(cpu_mask, rdt_ctrl_update, &msr_param, 1);
Tony Luck60ec2442016-10-28 15:04:47 -0700342 put_cpu();
343
Tony Luckc4026b7b2017-04-03 14:44:16 -0700344done:
Tony Luck60ec2442016-10-28 15:04:47 -0700345 free_cpumask_var(cpu_mask);
346
347 return 0;
348}
349
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700350static int rdtgroup_parse_resource(char *resname, char *tok,
351 struct rdtgroup *rdtgrp)
Vikas Shivappa4797b7d2017-04-19 16:50:04 -0700352{
353 struct rdt_resource *r;
354
Vikas Shivappa1b5c0b72017-07-25 14:14:25 -0700355 for_each_alloc_enabled_rdt_resource(r) {
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700356 if (!strcmp(resname, r->name) && rdtgrp->closid < r->num_closid)
357 return parse_line(tok, r, rdtgrp);
Vikas Shivappa4797b7d2017-04-19 16:50:04 -0700358 }
Babu Moger723f1a0d2018-11-21 20:28:43 +0000359 rdt_last_cmd_printf("Unknown or unsupported resource name '%s'\n", resname);
Vikas Shivappa4797b7d2017-04-19 16:50:04 -0700360 return -EINVAL;
361}
362
Tony Luck60ec2442016-10-28 15:04:47 -0700363ssize_t rdtgroup_schemata_write(struct kernfs_open_file *of,
364 char *buf, size_t nbytes, loff_t off)
365{
366 struct rdtgroup *rdtgrp;
Tony Luckc4026b7b2017-04-03 14:44:16 -0700367 struct rdt_domain *dom;
Tony Luck60ec2442016-10-28 15:04:47 -0700368 struct rdt_resource *r;
369 char *tok, *resname;
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700370 int ret = 0;
Tony Luck60ec2442016-10-28 15:04:47 -0700371
372 /* Valid input requires a trailing newline */
Tony Luck29e74f32017-09-25 16:39:35 -0700373 if (nbytes == 0 || buf[nbytes - 1] != '\n')
Tony Luck60ec2442016-10-28 15:04:47 -0700374 return -EINVAL;
375 buf[nbytes - 1] = '\0';
376
Reinette Chatre80b71c32018-12-10 13:21:54 -0800377 cpus_read_lock();
Tony Luck60ec2442016-10-28 15:04:47 -0700378 rdtgrp = rdtgroup_kn_lock_live(of->kn);
379 if (!rdtgrp) {
380 rdtgroup_kn_unlock(of->kn);
Reinette Chatre80b71c32018-12-10 13:21:54 -0800381 cpus_read_unlock();
Tony Luck60ec2442016-10-28 15:04:47 -0700382 return -ENOENT;
383 }
Tony Luckc377dcf2017-09-25 16:39:34 -0700384 rdt_last_cmd_clear();
Tony Luck60ec2442016-10-28 15:04:47 -0700385
Reinette Chatrec966dac2018-06-22 15:42:12 -0700386 /*
387 * No changes to pseudo-locked region allowed. It has to be removed
388 * and re-created instead.
389 */
390 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKED) {
391 ret = -EINVAL;
Babu Moger723f1a0d2018-11-21 20:28:43 +0000392 rdt_last_cmd_puts("Resource group is pseudo-locked\n");
Reinette Chatrec966dac2018-06-22 15:42:12 -0700393 goto out;
394 }
395
Vikas Shivappa1b5c0b72017-07-25 14:14:25 -0700396 for_each_alloc_enabled_rdt_resource(r) {
Tony Luckc4026b7b2017-04-03 14:44:16 -0700397 list_for_each_entry(dom, &r->domains, list)
Vikas Shivappa2545e9f2017-04-07 17:33:51 -0700398 dom->have_new_ctrl = false;
Vikas Shivappa4797b7d2017-04-19 16:50:04 -0700399 }
Tony Luck60ec2442016-10-28 15:04:47 -0700400
401 while ((tok = strsep(&buf, "\n")) != NULL) {
Vikas Shivappa634b0e02017-04-19 16:50:03 -0700402 resname = strim(strsep(&tok, ":"));
Tony Luck60ec2442016-10-28 15:04:47 -0700403 if (!tok) {
Tony Luckc377dcf2017-09-25 16:39:34 -0700404 rdt_last_cmd_puts("Missing ':'\n");
Tony Luck60ec2442016-10-28 15:04:47 -0700405 ret = -EINVAL;
406 goto out;
407 }
Xiaochen Shen22446452017-11-10 11:16:24 -0800408 if (tok[0] == '\0') {
409 rdt_last_cmd_printf("Missing '%s' value\n", resname);
410 ret = -EINVAL;
411 goto out;
412 }
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700413 ret = rdtgroup_parse_resource(resname, tok, rdtgrp);
Vikas Shivappa4797b7d2017-04-19 16:50:04 -0700414 if (ret)
Tony Luck60ec2442016-10-28 15:04:47 -0700415 goto out;
Tony Luck60ec2442016-10-28 15:04:47 -0700416 }
417
Vikas Shivappa1b5c0b72017-07-25 14:14:25 -0700418 for_each_alloc_enabled_rdt_resource(r) {
Reinette Chatre9ab9aa12018-06-22 15:42:04 -0700419 ret = update_domains(r, rdtgrp->closid);
Tony Luck60ec2442016-10-28 15:04:47 -0700420 if (ret)
421 goto out;
422 }
423
Reinette Chatree0bdfe82018-06-22 15:42:22 -0700424 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP) {
425 /*
426 * If pseudo-locking fails we keep the resource group in
427 * mode RDT_MODE_PSEUDO_LOCKSETUP with its class of service
428 * active and updated for just the domain the pseudo-locked
429 * region was requested for.
430 */
431 ret = rdtgroup_pseudo_lock_create(rdtgrp);
432 }
433
Tony Luck60ec2442016-10-28 15:04:47 -0700434out:
435 rdtgroup_kn_unlock(of->kn);
Reinette Chatre80b71c32018-12-10 13:21:54 -0800436 cpus_read_unlock();
Tony Luck60ec2442016-10-28 15:04:47 -0700437 return ret ?: nbytes;
438}
439
440static void show_doms(struct seq_file *s, struct rdt_resource *r, int closid)
441{
442 struct rdt_domain *dom;
443 bool sep = false;
Vikas Shivappa8205a072018-04-20 15:36:19 -0700444 u32 ctrl_val;
Tony Luck60ec2442016-10-28 15:04:47 -0700445
Vikas Shivappade016df2017-04-03 14:44:17 -0700446 seq_printf(s, "%*s:", max_name_width, r->name);
Tony Luck60ec2442016-10-28 15:04:47 -0700447 list_for_each_entry(dom, &r->domains, list) {
448 if (sep)
449 seq_puts(s, ";");
Vikas Shivappa8205a072018-04-20 15:36:19 -0700450
451 ctrl_val = (!is_mba_sc(r) ? dom->ctrl_val[closid] :
452 dom->mbps_val[closid]);
Vikas Shivappac6ea67d2017-04-07 17:33:56 -0700453 seq_printf(s, r->format_str, dom->id, max_data_width,
Vikas Shivappa8205a072018-04-20 15:36:19 -0700454 ctrl_val);
Tony Luck60ec2442016-10-28 15:04:47 -0700455 sep = true;
456 }
457 seq_puts(s, "\n");
458}
459
460int rdtgroup_schemata_show(struct kernfs_open_file *of,
461 struct seq_file *s, void *v)
462{
463 struct rdtgroup *rdtgrp;
464 struct rdt_resource *r;
Vikas Shivappad89b7372017-07-25 14:14:38 -0700465 int ret = 0;
466 u32 closid;
Tony Luck60ec2442016-10-28 15:04:47 -0700467
468 rdtgrp = rdtgroup_kn_lock_live(of->kn);
469 if (rdtgrp) {
Reinette Chatredfe96742018-06-22 15:42:17 -0700470 if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP) {
471 for_each_alloc_enabled_rdt_resource(r)
472 seq_printf(s, "%s:uninitialized\n", r->name);
Reinette Chatref4e80d62018-06-22 15:42:23 -0700473 } else if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKED) {
Jithu Josephb61b8bb2018-10-12 15:51:01 -0700474 if (!rdtgrp->plr->d) {
475 rdt_last_cmd_clear();
476 rdt_last_cmd_puts("Cache domain offline\n");
477 ret = -ENODEV;
478 } else {
479 seq_printf(s, "%s:%d=%x\n",
480 rdtgrp->plr->r->name,
481 rdtgrp->plr->d->id,
482 rdtgrp->plr->cbm);
483 }
Reinette Chatredfe96742018-06-22 15:42:17 -0700484 } else {
485 closid = rdtgrp->closid;
486 for_each_alloc_enabled_rdt_resource(r) {
487 if (closid < r->num_closid)
488 show_doms(s, r, closid);
489 }
Tony Luck60ec2442016-10-28 15:04:47 -0700490 }
491 } else {
492 ret = -ENOENT;
493 }
494 rdtgroup_kn_unlock(of->kn);
495 return ret;
496}
Vikas Shivappad89b7372017-07-25 14:14:38 -0700497
498void mon_event_read(struct rmid_read *rr, struct rdt_domain *d,
Vikas Shivappaa4de1df2017-07-25 14:14:46 -0700499 struct rdtgroup *rdtgrp, int evtid, int first)
Vikas Shivappad89b7372017-07-25 14:14:38 -0700500{
501 /*
502 * setup the parameters to send to the IPI to read the data.
503 */
504 rr->rgrp = rdtgrp;
505 rr->evtid = evtid;
Tony Luck9f524252017-07-25 14:14:45 -0700506 rr->d = d;
Vikas Shivappad89b7372017-07-25 14:14:38 -0700507 rr->val = 0;
Vikas Shivappaa4de1df2017-07-25 14:14:46 -0700508 rr->first = first;
Vikas Shivappad89b7372017-07-25 14:14:38 -0700509
510 smp_call_function_any(&d->cpu_mask, mon_event_count, rr, 1);
511}
512
513int rdtgroup_mondata_show(struct seq_file *m, void *arg)
514{
515 struct kernfs_open_file *of = m->private;
516 u32 resid, evtid, domid;
517 struct rdtgroup *rdtgrp;
518 struct rdt_resource *r;
519 union mon_data_bits md;
520 struct rdt_domain *d;
521 struct rmid_read rr;
522 int ret = 0;
523
524 rdtgrp = rdtgroup_kn_lock_live(of->kn);
525
526 md.priv = of->kn->priv;
527 resid = md.u.rid;
528 domid = md.u.domid;
529 evtid = md.u.evtid;
530
531 r = &rdt_resources_all[resid];
532 d = rdt_find_domain(r, domid, NULL);
Reinette Chatre52eb7432018-12-10 14:31:13 -0800533 if (IS_ERR_OR_NULL(d)) {
Vikas Shivappad89b7372017-07-25 14:14:38 -0700534 ret = -ENOENT;
535 goto out;
536 }
537
Vikas Shivappaa4de1df2017-07-25 14:14:46 -0700538 mon_event_read(&rr, d, rdtgrp, evtid, false);
Vikas Shivappad89b7372017-07-25 14:14:38 -0700539
540 if (rr.val & RMID_VAL_ERROR)
541 seq_puts(m, "Error\n");
542 else if (rr.val & RMID_VAL_UNAVAIL)
543 seq_puts(m, "Unavailable\n");
544 else
545 seq_printf(m, "%llu\n", rr.val * r->mon_scale);
546
547out:
548 rdtgroup_kn_unlock(of->kn);
549 return ret;
550}