Documentation/arch/x86/index.rst | 1 -
Documentation/filesystems/index.rst | 1 +
.../{arch/x86 => filesystems}/resctrl.rst | 0
MAINTAINERS | 4 +-
arch/Kconfig | 8 +
arch/x86/Kconfig | 6 +-
arch/x86/include/asm/resctrl.h | 43 +-
arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
arch/x86/kernel/cpu/resctrl/core.c | 214 +-
arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
.../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
arch/x86/kernel/process_32.c | 2 +-
arch/x86/kernel/process_64.c | 2 +-
fs/Kconfig | 1 +
fs/Makefile | 1 +
fs/resctrl/Kconfig | 39 +
fs/resctrl/Makefile | 6 +
fs/resctrl/ctrlmondata.c | 660 +++
fs/resctrl/internal.h | 435 ++
fs/resctrl/monitor.c | 933 ++++
fs/resctrl/monitor_trace.h | 33 +
fs/resctrl/pseudo_lock.c | 1104 +++++
fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
include/linux/resctrl.h | 216 +-
include/linux/resctrl_types.h | 59 +
29 files changed, 7992 insertions(+), 7263 deletions(-)
rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
create mode 100644 fs/resctrl/Kconfig
create mode 100644 fs/resctrl/Makefile
create mode 100644 fs/resctrl/ctrlmondata.c
create mode 100644 fs/resctrl/internal.h
create mode 100644 fs/resctrl/monitor.c
create mode 100644 fs/resctrl/monitor_trace.h
create mode 100644 fs/resctrl/pseudo_lock.c
create mode 100644 fs/resctrl/rdtgroup.c
create mode 100644 include/linux/resctrl_types.h
Changes since v6?:
* All the excitement is in patch 37, turns out there are two rmdir() paths
that don't join up.
The last eight patches are new:
* The python script has been replaced with the patch that it generates, see
the bare branch below if you want to regenerate it.
* There have been comments on the followup to the generated patch, those are
included here - I suggest they be squashed into the generated patch.
* This version includes some checkpatch linting from Dave.
---
This series renames functions and moves code around. With the
exception of invalid configurations for the configurable-events, there should
be no changes in behaviour caused by this series. It is now possible for
throttle_mode to report 'undefined', but no known platform will do this.
The driving pattern is to make things like struct rdtgroup private to resctrl.
Features like pseudo-lock aren't going to work on arm64, the ability to disable
it at compile time is added.
After this, I can start posting the MPAM driver to make use of resctrl on arm64.
(What's MPAM? See the cover letter of the first series. [1])
This series is based on v6.14-rc3 and can be retrieved from:
https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
or for those who want to regnerate the patch that moves all the code:
https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
As ever - bugs welcome,
Thanks,
James
[v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
[v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
[v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
[v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
[v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
[v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
[1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/
Amit Singh Tomar (1):
x86/resctrl: Remove the limit on the number of CLOSID
Dave Martin (3):
x86/resctrl: Squelch whitespace anomalies in resctrl core code
x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
x86/resctrl: Relax some asm #includes
James Morse (45):
x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
monitors
x86/resctrl: Add a helper to avoid reaching into the arch code
resource list
x86/resctrl: Remove fflags from struct rdt_resource
x86/resctrl: Use schema type to determine how to parse schema values
x86/resctrl: Use schema type to determine the schema format string
x86/resctrl: Remove data_width and the tabular format
x86/resctrl: Add max_bw to struct resctrl_membw
x86/resctrl: Generate default_ctrl instead of sharing it
x86/resctrl: Add helper for setting CPU default properties
x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
x86/resctrl: Expose resctrl fs's init function to the rest of the
kernel
x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
x86/resctrl: Move resctrl types to a separate header
x86/resctrl: Add an arch helper to reset one resource
x86/resctrl: Move monitor exit work to a resctrl exit call
x86/resctrl: Move monitor init work to a resctrl init call
x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
x86/resctrl: Move mba_mbps_default_event init to filesystem code
x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
x86/resctrl: Allow an architecture to disable pseudo lock
x86/resctrl: Make prefetch_disable_bits belong to the arch code
x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
x86/resctrl: Move RFTYPE flags to be managed by resctrl
x86/resctrl: Handle throttle_mode for SMBA resources
x86/resctrl: Move get_config_index() to a header
x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
callers
x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
x86/resctrl: Drop __init/__exit on assorted symbols
x86/resctrl: Move is_mba_sc() out of core.c
x86/resctrl: Add end-marker to the resctrl_event_id enum
x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
x86/resctrl: Remove a newline to avoid confusing the code move script
x86/resctrl: Split trace.h
fs/resctrl: Add boiler plate for external resctrl code
x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
x86,fs/resctrl: Move the resctrl filesystem code to live in
/fs/resctrl
x86,fs/resctrl: Remove duplicated trace header files
fs/resctrl: Remove unnecessary includes
fs/resctrl: Change internal.h's header guard macros
x86,fs/resctrl: Move resctrl.rst to live under
Documentation/filesystems
Documentation/arch/x86/index.rst | 1 -
Documentation/filesystems/index.rst | 1 +
.../{arch/x86 => filesystems}/resctrl.rst | 0
MAINTAINERS | 4 +-
arch/Kconfig | 8 +
arch/x86/Kconfig | 6 +-
arch/x86/include/asm/resctrl.h | 43 +-
arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
arch/x86/kernel/cpu/resctrl/core.c | 214 +-
arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
.../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
arch/x86/kernel/process_32.c | 2 +-
arch/x86/kernel/process_64.c | 2 +-
fs/Kconfig | 1 +
fs/Makefile | 1 +
fs/resctrl/Kconfig | 39 +
fs/resctrl/Makefile | 6 +
fs/resctrl/ctrlmondata.c | 660 +++
fs/resctrl/internal.h | 435 ++
fs/resctrl/monitor.c | 933 ++++
fs/resctrl/monitor_trace.h | 33 +
fs/resctrl/pseudo_lock.c | 1104 +++++
fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
include/linux/resctrl.h | 216 +-
include/linux/resctrl_types.h | 59 +
29 files changed, 7992 insertions(+), 7263 deletions(-)
rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
create mode 100644 fs/resctrl/Kconfig
create mode 100644 fs/resctrl/Makefile
create mode 100644 fs/resctrl/ctrlmondata.c
create mode 100644 fs/resctrl/internal.h
create mode 100644 fs/resctrl/monitor.c
create mode 100644 fs/resctrl/monitor_trace.h
create mode 100644 fs/resctrl/pseudo_lock.c
create mode 100644 fs/resctrl/rdtgroup.c
create mode 100644 include/linux/resctrl_types.h
--
2.39.5
On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote: > Changes since v6?: > * All the excitement is in patch 37, turns out there are two rmdir() paths > that don't join up. > The last eight patches are new: > * The python script has been replaced with the patch that it generates, see > the bare branch below if you want to regenerate it. > * There have been comments on the followup to the generated patch, those are > included here - I suggest they be squashed into the generated patch. > * This version includes some checkpatch linting from Dave. > > --- > This series renames functions and moves code around. With the > exception of invalid configurations for the configurable-events, there should > be no changes in behaviour caused by this series. It is now possible for > throttle_mode to report 'undefined', but no known platform will do this. > > The driving pattern is to make things like struct rdtgroup private to resctrl. > Features like pseudo-lock aren't going to work on arm64, the ability to disable > it at compile time is added. > > After this, I can start posting the MPAM driver to make use of resctrl on arm64. > (What's MPAM? See the cover letter of the first series. [1]) > > This series is based on v6.14-rc3 and can be retrieved from: > https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7 > or for those who want to regnerate the patch that moves all the code: > https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare > > > As ever - bugs welcome, > Thanks, > > James Upstream is at -rc5, so it's time to pick what to ask Boris to apply to tip for the upcoming v6.15 merge window. There are several open issues for Babu's ABMC series. So it isn't ready at this time. Also several against this MPAM series from James ... but IMHO the first bunch of patches look to be in good shape with a full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17 (things get murkier in the 20's and maybe more likely to have issues due to skipping patches that don't have all their tags). So I applied those patches on top of v6.14-rc5 (all but one applied automatically, patch 10 had two line "fuzz" due to skipping patch 8). Resulting kernel builds (with W=1), boots, and passes the tests in tools/tests/selftests/resctrl. In the interests of making forward progress, should we ask Boris to take this subset of the MPAM series? -Tony
On 3/4/25 1:47 PM, Luck, Tony wrote: > On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote: >> Changes since v6?: >> * All the excitement is in patch 37, turns out there are two rmdir() paths >> that don't join up. >> The last eight patches are new: >> * The python script has been replaced with the patch that it generates, see >> the bare branch below if you want to regenerate it. >> * There have been comments on the followup to the generated patch, those are >> included here - I suggest they be squashed into the generated patch. >> * This version includes some checkpatch linting from Dave. >> >> --- >> This series renames functions and moves code around. With the >> exception of invalid configurations for the configurable-events, there should >> be no changes in behaviour caused by this series. It is now possible for >> throttle_mode to report 'undefined', but no known platform will do this. >> >> The driving pattern is to make things like struct rdtgroup private to resctrl. >> Features like pseudo-lock aren't going to work on arm64, the ability to disable >> it at compile time is added. >> >> After this, I can start posting the MPAM driver to make use of resctrl on arm64. >> (What's MPAM? See the cover letter of the first series. [1]) >> >> This series is based on v6.14-rc3 and can be retrieved from: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7 >> or for those who want to regnerate the patch that moves all the code: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare >> >> >> As ever - bugs welcome, >> Thanks, >> >> James > > Upstream is at -rc5, so it's time to pick what to ask Boris to > apply to tip for the upcoming v6.15 merge window. > > There are several open issues for Babu's ABMC series. So it > isn't ready at this time. > > Also several against this MPAM series from James ... but IMHO the > first bunch of patches look to be in good shape with a > full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17 > (things get murkier in the 20's and maybe more likely to have > issues due to skipping patches that don't have all their tags). > > So I applied those patches on top of v6.14-rc5 (all but one applied > automatically, patch 10 had two line "fuzz" due to skipping patch 8). > > Resulting kernel builds (with W=1), boots, and passes the tests > in tools/tests/selftests/resctrl. > > In the interests of making forward progress, should we ask Boris > to take this subset of the MPAM series? > Sounds like there may have only been about a five minute window for clarifying questions about v6 before the door was shut on it. Since I missed that window by a couple of hours I'll move to v7 where the MPAM pressure has so promptly shifted. I'd be happy to work with Boris and other x86 maintainers on any mechanism they prefer. Reinette
On 3/5/25 10:35, Reinette Chatre wrote: > > > On 3/4/25 1:47 PM, Luck, Tony wrote: >> On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote: >>> Changes since v6?: >>> * All the excitement is in patch 37, turns out there are two rmdir() paths >>> that don't join up. >>> The last eight patches are new: >>> * The python script has been replaced with the patch that it generates, see >>> the bare branch below if you want to regenerate it. >>> * There have been comments on the followup to the generated patch, those are >>> included here - I suggest they be squashed into the generated patch. >>> * This version includes some checkpatch linting from Dave. >>> >>> --- >>> This series renames functions and moves code around. With the >>> exception of invalid configurations for the configurable-events, there should >>> be no changes in behaviour caused by this series. It is now possible for >>> throttle_mode to report 'undefined', but no known platform will do this. >>> >>> The driving pattern is to make things like struct rdtgroup private to resctrl. >>> Features like pseudo-lock aren't going to work on arm64, the ability to disable >>> it at compile time is added. >>> >>> After this, I can start posting the MPAM driver to make use of resctrl on arm64. >>> (What's MPAM? See the cover letter of the first series. [1]) >>> >>> This series is based on v6.14-rc3 and can be retrieved from: >>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7 >>> or for those who want to regnerate the patch that moves all the code: >>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare >>> >>> >>> As ever - bugs welcome, >>> Thanks, >>> >>> James >> >> Upstream is at -rc5, so it's time to pick what to ask Boris to >> apply to tip for the upcoming v6.15 merge window. >> >> There are several open issues for Babu's ABMC series. So it >> isn't ready at this time. I agree. ABMC series is not ready yet. This series should merge first. I have tested on couple of AMD systems and everything looks good. I will respond with Tested-by and reviewed-by. >> >> Also several against this MPAM series from James ... but IMHO the >> first bunch of patches look to be in good shape with a >> full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17 >> (things get murkier in the 20's and maybe more likely to have >> issues due to skipping patches that don't have all their tags). >> >> So I applied those patches on top of v6.14-rc5 (all but one applied >> automatically, patch 10 had two line "fuzz" due to skipping patch 8). >> >> Resulting kernel builds (with W=1), boots, and passes the tests >> in tools/tests/selftests/resctrl. >> >> In the interests of making forward progress, should we ask Boris >> to take this subset of the MPAM series? >> > > Sounds like there may have only been about a five minute window for > clarifying questions about v6 before the door was shut on it. > Since I missed that window by a couple of hours I'll move to > v7 where the MPAM pressure has so promptly shifted. > > I'd be happy to work with Boris and other x86 maintainers on > any mechanism they prefer. > Sure. Please go ahead. -- Thanks Babu Moger
On 2/28/25 13:58, James Morse wrote:
> Changes since v6?:
> * All the excitement is in patch 37, turns out there are two rmdir() paths
> that don't join up.
> The last eight patches are new:
> * The python script has been replaced with the patch that it generates, see
> the bare branch below if you want to regenerate it.
> * There have been comments on the followup to the generated patch, those are
> included here - I suggest they be squashed into the generated patch.
> * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
> [v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
> [v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
> [v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
> [v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
> [v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
> [1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/
>
> Amit Singh Tomar (1):
> x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
> x86/resctrl: Squelch whitespace anomalies in resctrl core code
> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
> x86/resctrl: Relax some asm #includes
>
> James Morse (45):
> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
> monitors
> x86/resctrl: Add a helper to avoid reaching into the arch code
> resource list
> x86/resctrl: Remove fflags from struct rdt_resource
> x86/resctrl: Use schema type to determine how to parse schema values
> x86/resctrl: Use schema type to determine the schema format string
> x86/resctrl: Remove data_width and the tabular format
> x86/resctrl: Add max_bw to struct resctrl_membw
> x86/resctrl: Generate default_ctrl instead of sharing it
> x86/resctrl: Add helper for setting CPU default properties
> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
> x86/resctrl: Expose resctrl fs's init function to the rest of the
> kernel
> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
> x86/resctrl: Move resctrl types to a separate header
> x86/resctrl: Add an arch helper to reset one resource
> x86/resctrl: Move monitor exit work to a resctrl exit call
> x86/resctrl: Move monitor init work to a resctrl init call
> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
> x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
> x86/resctrl: Move mba_mbps_default_event init to filesystem code
> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
> x86/resctrl: Allow an architecture to disable pseudo lock
> x86/resctrl: Make prefetch_disable_bits belong to the arch code
> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
> x86/resctrl: Move RFTYPE flags to be managed by resctrl
> x86/resctrl: Handle throttle_mode for SMBA resources
> x86/resctrl: Move get_config_index() to a header
> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
> callers
> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
> x86/resctrl: Drop __init/__exit on assorted symbols
> x86/resctrl: Move is_mba_sc() out of core.c
> x86/resctrl: Add end-marker to the resctrl_event_id enum
> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
> x86/resctrl: Remove a newline to avoid confusing the code move script
> x86/resctrl: Split trace.h
> fs/resctrl: Add boiler plate for external resctrl code
> x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
> x86,fs/resctrl: Move the resctrl filesystem code to live in
> /fs/resctrl
> x86,fs/resctrl: Remove duplicated trace header files
> fs/resctrl: Remove unnecessary includes
> fs/resctrl: Change internal.h's header guard macros
> x86,fs/resctrl: Move resctrl.rst to live under
> Documentation/filesystems
>
> Documentation/arch/x86/index.rst | 1 -
> Documentation/filesystems/index.rst | 1 +
> .../{arch/x86 => filesystems}/resctrl.rst | 0
> MAINTAINERS | 4 +-
> arch/Kconfig | 8 +
> arch/x86/Kconfig | 6 +-
> arch/x86/include/asm/resctrl.h | 43 +-
> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
> arch/x86/kernel/process_32.c | 2 +-
> arch/x86/kernel/process_64.c | 2 +-
> fs/Kconfig | 1 +
> fs/Makefile | 1 +
> fs/resctrl/Kconfig | 39 +
> fs/resctrl/Makefile | 6 +
> fs/resctrl/ctrlmondata.c | 660 +++
> fs/resctrl/internal.h | 435 ++
> fs/resctrl/monitor.c | 933 ++++
> fs/resctrl/monitor_trace.h | 33 +
> fs/resctrl/pseudo_lock.c | 1104 +++++
> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
> include/linux/resctrl.h | 216 +-
> include/linux/resctrl_types.h | 59 +
> 29 files changed, 7992 insertions(+), 7263 deletions(-)
> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
> create mode 100644 fs/resctrl/Kconfig
> create mode 100644 fs/resctrl/Makefile
> create mode 100644 fs/resctrl/ctrlmondata.c
> create mode 100644 fs/resctrl/internal.h
> create mode 100644 fs/resctrl/monitor.c
> create mode 100644 fs/resctrl/monitor_trace.h
> create mode 100644 fs/resctrl/pseudo_lock.c
> create mode 100644 fs/resctrl/rdtgroup.c
> create mode 100644 include/linux/resctrl_types.h
>
Ran tests on couple of AMD systems. Everything looks good.
Tested-by: Babu Moger <babu.moger@amd.com>
--
Thanks
Babu Moger
Hi Babu, On 10/03/2025 14:07, Moger, Babu wrote: > On 2/28/25 13:58, James Morse wrote: >> Changes since v6?: >> * All the excitement is in patch 37, turns out there are two rmdir() paths >> that don't join up. >> The last eight patches are new: >> * The python script has been replaced with the patch that it generates, see >> the bare branch below if you want to regenerate it. >> * There have been comments on the followup to the generated patch, those are >> included here - I suggest they be squashed into the generated patch. >> * This version includes some checkpatch linting from Dave. >> >> --- >> This series renames functions and moves code around. With the >> exception of invalid configurations for the configurable-events, there should >> be no changes in behaviour caused by this series. It is now possible for >> throttle_mode to report 'undefined', but no known platform will do this. >> >> The driving pattern is to make things like struct rdtgroup private to resctrl. >> Features like pseudo-lock aren't going to work on arm64, the ability to disable >> it at compile time is added. >> >> After this, I can start posting the MPAM driver to make use of resctrl on arm64. >> (What's MPAM? See the cover letter of the first series. [1]) >> >> This series is based on v6.14-rc3 and can be retrieved from: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7 >> or for those who want to regnerate the patch that moves all the code: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare > Ran tests on couple of AMD systems. Everything looks good. > > Tested-by: Babu Moger <babu.moger@amd.com> Thanks! James
Hi James,
Changes since v6?:
> * All the excitement is in patch 37, turns out there are two rmdir() paths
> that don't join up.
> The last eight patches are new:
> * The python script has been replaced with the patch that it generates, see
> the bare branch below if you want to regenerate it.
> * There have been comments on the followup to the generated patch, those are
> included here - I suggest they be squashed into the generated patch.
> * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
After rebasing mpam/snapshot/v6.14-rc1 on top of this series, Tested a
few MPAM controls, including Cache Portion Partitioning and Memory
Bandwidth Partitioning, on Marvell CN10K ARM64 platform, and It looks good.
For this patch-set:
Tested-by: amitsinght@marvell.com
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>
> Amit Singh Tomar (1):
> x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
> x86/resctrl: Squelch whitespace anomalies in resctrl core code
> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
> x86/resctrl: Relax some asm #includes
>
> James Morse (45):
> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
> monitors
> x86/resctrl: Add a helper to avoid reaching into the arch code
> resource list
> x86/resctrl: Remove fflags from struct rdt_resource
> x86/resctrl: Use schema type to determine how to parse schema values
> x86/resctrl: Use schema type to determine the schema format string
> x86/resctrl: Remove data_width and the tabular format
> x86/resctrl: Add max_bw to struct resctrl_membw
> x86/resctrl: Generate default_ctrl instead of sharing it
> x86/resctrl: Add helper for setting CPU default properties
> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
> x86/resctrl: Expose resctrl fs's init function to the rest of the
> kernel
> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
> x86/resctrl: Move resctrl types to a separate header
> x86/resctrl: Add an arch helper to reset one resource
> x86/resctrl: Move monitor exit work to a resctrl exit call
> x86/resctrl: Move monitor init work to a resctrl init call
> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
> x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
> x86/resctrl: Move mba_mbps_default_event init to filesystem code
> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
> x86/resctrl: Allow an architecture to disable pseudo lock
> x86/resctrl: Make prefetch_disable_bits belong to the arch code
> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
> x86/resctrl: Move RFTYPE flags to be managed by resctrl
> x86/resctrl: Handle throttle_mode for SMBA resources
> x86/resctrl: Move get_config_index() to a header
> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
> callers
> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
> x86/resctrl: Drop __init/__exit on assorted symbols
> x86/resctrl: Move is_mba_sc() out of core.c
> x86/resctrl: Add end-marker to the resctrl_event_id enum
> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
> x86/resctrl: Remove a newline to avoid confusing the code move script
> x86/resctrl: Split trace.h
> fs/resctrl: Add boiler plate for external resctrl code
> x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
> x86,fs/resctrl: Move the resctrl filesystem code to live in
> /fs/resctrl
> x86,fs/resctrl: Remove duplicated trace header files
> fs/resctrl: Remove unnecessary includes
> fs/resctrl: Change internal.h's header guard macros
> x86,fs/resctrl: Move resctrl.rst to live under
> Documentation/filesystems
>
> Documentation/arch/x86/index.rst | 1 -
> Documentation/filesystems/index.rst | 1 +
> .../{arch/x86 => filesystems}/resctrl.rst | 0
> MAINTAINERS | 4 +-
> arch/Kconfig | 8 +
> arch/x86/Kconfig | 6 +-
> arch/x86/include/asm/resctrl.h | 43 +-
> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
> arch/x86/kernel/process_32.c | 2 +-
> arch/x86/kernel/process_64.c | 2 +-
> fs/Kconfig | 1 +
> fs/Makefile | 1 +
> fs/resctrl/Kconfig | 39 +
> fs/resctrl/Makefile | 6 +
> fs/resctrl/ctrlmondata.c | 660 +++
> fs/resctrl/internal.h | 435 ++
> fs/resctrl/monitor.c | 933 ++++
> fs/resctrl/monitor_trace.h | 33 +
> fs/resctrl/pseudo_lock.c | 1104 +++++
> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
> include/linux/resctrl.h | 216 +-
> include/linux/resctrl_types.h | 59 +
> 29 files changed, 7992 insertions(+), 7263 deletions(-)
> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
> create mode 100644 fs/resctrl/Kconfig
> create mode 100644 fs/resctrl/Makefile
> create mode 100644 fs/resctrl/ctrlmondata.c
> create mode 100644 fs/resctrl/internal.h
> create mode 100644 fs/resctrl/monitor.c
> create mode 100644 fs/resctrl/monitor_trace.h
> create mode 100644 fs/resctrl/pseudo_lock.c
> create mode 100644 fs/resctrl/rdtgroup.c
> create mode 100644 include/linux/resctrl_types.h
>
> --
> 2.39.5
>
On 3/1/2025 1:28 AM, James Morse wrote:
> Changes since v6?: * All the excitement is in patch 37, turns out
> there are two rmdir() paths that don't join up. The last eight patches
> are new: * The python script has been replaced with the patch that it
> generates, see the bare branch below
>
> Changes since v6?:
> * All the excitement is in patch 37, turns out there are two rmdir() paths
> that don't join up.
> The last eight patches are new:
> * The python script has been replaced with the patch that it generates, see
> the bare branch below if you want to regenerate it.
> * There have been comments on the followup to the generated patch, those are
> included here - I suggest they be squashed into the generated patch.
> * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>
> Amit Singh Tomar (1):
> x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
> x86/resctrl: Squelch whitespace anomalies in resctrl core code
> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
> x86/resctrl: Relax some asm #includes
>
> James Morse (45):
> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
> monitors
> x86/resctrl: Add a helper to avoid reaching into the arch code
> resource list
> x86/resctrl: Remove fflags from struct rdt_resource
> x86/resctrl: Use schema type to determine how to parse schema values
> x86/resctrl: Use schema type to determine the schema format string
> x86/resctrl: Remove data_width and the tabular format
> x86/resctrl: Add max_bw to struct resctrl_membw
> x86/resctrl: Generate default_ctrl instead of sharing it
> x86/resctrl: Add helper for setting CPU default properties
> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
> x86/resctrl: Expose resctrl fs's init function to the rest of the
> kernel
> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
> x86/resctrl: Move resctrl types to a separate header
> x86/resctrl: Add an arch helper to reset one resource
> x86/resctrl: Move monitor exit work to a resctrl exit call
> x86/resctrl: Move monitor init work to a resctrl init call
> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
> x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
> x86/resctrl: Move mba_mbps_default_event init to filesystem code
> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
> x86/resctrl: Allow an architecture to disable pseudo lock
> x86/resctrl: Make prefetch_disable_bits belong to the arch code
> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
> x86/resctrl: Move RFTYPE flags to be managed by resctrl
> x86/resctrl: Handle throttle_mode for SMBA resources
> x86/resctrl: Move get_config_index() to a header
> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
> callers
> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
> x86/resctrl: Drop __init/__exit on assorted symbols
> x86/resctrl: Move is_mba_sc() out of core.c
> x86/resctrl: Add end-marker to the resctrl_event_id enum
> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
> x86/resctrl: Remove a newline to avoid confusing the code move script
> x86/resctrl: Split trace.h
> fs/resctrl: Add boiler plate for external resctrl code
> x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
> x86,fs/resctrl: Move the resctrl filesystem code to live in
> /fs/resctrl
> x86,fs/resctrl: Remove duplicated trace header files
> fs/resctrl: Remove unnecessary includes
> fs/resctrl: Change internal.h's header guard macros
> x86,fs/resctrl: Move resctrl.rst to live under
> Documentation/filesystems
>
> Documentation/arch/x86/index.rst | 1 -
> Documentation/filesystems/index.rst | 1 +
> .../{arch/x86 => filesystems}/resctrl.rst | 0
> MAINTAINERS | 4 +-
> arch/Kconfig | 8 +
> arch/x86/Kconfig | 6 +-
> arch/x86/include/asm/resctrl.h | 43 +-
> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
> arch/x86/kernel/process_32.c | 2 +-
> arch/x86/kernel/process_64.c | 2 +-
> fs/Kconfig | 1 +
> fs/Makefile | 1 +
> fs/resctrl/Kconfig | 39 +
> fs/resctrl/Makefile | 6 +
> fs/resctrl/ctrlmondata.c | 660 +++
> fs/resctrl/internal.h | 435 ++
> fs/resctrl/monitor.c | 933 ++++
> fs/resctrl/monitor_trace.h | 33 +
> fs/resctrl/pseudo_lock.c | 1104 +++++
> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
> include/linux/resctrl.h | 216 +-
> include/linux/resctrl_types.h | 59 +
> 29 files changed, 7992 insertions(+), 7263 deletions(-)
> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
> create mode 100644 fs/resctrl/Kconfig
> create mode 100644 fs/resctrl/Makefile
> create mode 100644 fs/resctrl/ctrlmondata.c
> create mode 100644 fs/resctrl/internal.h
> create mode 100644 fs/resctrl/monitor.c
> create mode 100644 fs/resctrl/monitor_trace.h
> create mode 100644 fs/resctrl/pseudo_lock.c
> create mode 100644 fs/resctrl/rdtgroup.c
> create mode 100644 include/linux/resctrl_types.h
>
> --
> 2.39.5
>
On 3/7/2025 3:57 PM, Amit Singh Tomar wrote:
> Hi James,
>
> Changes since v6?:
>
>> * All the excitement is in patch 37, turns out there are two
>> rmdir() paths
>> that don't join up.
>> The last eight patches are new:
>> * The python script has been replaced with the patch that it
>> generates, see
>> the bare branch below if you want to regenerate it.
>> * There have been comments on the followup to the generated patch,
>> those are
>> included here - I suggest they be squashed into the generated patch.
>> * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events,
>> there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to
>> resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability
>> to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of
>> resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=>
>> mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>
> After rebasing mpam/snapshot/v6.14-rc1 on top of this series, Tested a
> few MPAM controls, including Cache Portion Partitioning and Memory
> Bandwidth Partitioning, on Marvell CN10K ARM64 platform, and It looks
> good.
>
> For this patch-set:
> Tested-by: amitsinght@marvell.com
Realized I used an incorrect format for the Tested-by tag, correcting it now
Tested-by: Amit Singh Tomar <amitsinght@marvell.com>
>
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=>
>> mpam/move_to_fs/v7_bare
>>
>>
>> As ever - bugs welcome,
>> Thanks,
>>
>> James
>>
>> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
>>
>> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
>>
>> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
>>
>> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
>>
>> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
>>
>> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
>>
>> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>>
>>
>> Amit Singh Tomar (1):
>> x86/resctrl: Remove the limit on the number of CLOSID
>>
>> Dave Martin (3):
>> x86/resctrl: Squelch whitespace anomalies in resctrl core code
>> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in
>> rdt_init_fs_context()
>> x86/resctrl: Relax some asm #includes
>>
>> James Morse (45):
>> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>> monitors
>> x86/resctrl: Add a helper to avoid reaching into the arch code
>> resource list
>> x86/resctrl: Remove fflags from struct rdt_resource
>> x86/resctrl: Use schema type to determine how to parse schema values
>> x86/resctrl: Use schema type to determine the schema format string
>> x86/resctrl: Remove data_width and the tabular format
>> x86/resctrl: Add max_bw to struct resctrl_membw
>> x86/resctrl: Generate default_ctrl instead of sharing it
>> x86/resctrl: Add helper for setting CPU default properties
>> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>> x86/resctrl: Expose resctrl fs's init function to the rest of the
>> kernel
>> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>> x86/resctrl: Move resctrl types to a separate header
>> x86/resctrl: Add an arch helper to reset one resource
>> x86/resctrl: Move monitor exit work to a resctrl exit call
>> x86/resctrl: Move monitor init work to a resctrl init call
>> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>> x86/resctrl: Change mon_event_config_{read,write}() to be arch
>> helpers
>> x86/resctrl: Move mba_mbps_default_event init to filesystem code
>> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>> x86/resctrl: Allow an architecture to disable pseudo lock
>> x86/resctrl: Make prefetch_disable_bits belong to the arch code
>> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>> x86/resctrl: Move RFTYPE flags to be managed by resctrl
>> x86/resctrl: Handle throttle_mode for SMBA resources
>> x86/resctrl: Move get_config_index() to a header
>> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>> callers
>> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount
>> point
>> x86/resctrl: Drop __init/__exit on assorted symbols
>> x86/resctrl: Move is_mba_sc() out of core.c
>> x86/resctrl: Add end-marker to the resctrl_event_id enum
>> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>> x86/resctrl: Remove a newline to avoid confusing the code move script
>> x86/resctrl: Split trace.h
>> fs/resctrl: Add boiler plate for external resctrl code
>> x86/resctrl: Move the filesystem bits to headers visible to
>> fs/resctrl
>> x86,fs/resctrl: Move the resctrl filesystem code to live in
>> /fs/resctrl
>> x86,fs/resctrl: Remove duplicated trace header files
>> fs/resctrl: Remove unnecessary includes
>> fs/resctrl: Change internal.h's header guard macros
>> x86,fs/resctrl: Move resctrl.rst to live under
>> Documentation/filesystems
>>
>> Documentation/arch/x86/index.rst | 1 -
>> Documentation/filesystems/index.rst | 1 +
>> .../{arch/x86 => filesystems}/resctrl.rst | 0
>> MAINTAINERS | 4 +-
>> arch/Kconfig | 8 +
>> arch/x86/Kconfig | 6 +-
>> arch/x86/include/asm/resctrl.h | 43 +-
>> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
>> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
>> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
>> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
>> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
>> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
>> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
>> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
>> arch/x86/kernel/process_32.c | 2 +-
>> arch/x86/kernel/process_64.c | 2 +-
>> fs/Kconfig | 1 +
>> fs/Makefile | 1 +
>> fs/resctrl/Kconfig | 39 +
>> fs/resctrl/Makefile | 6 +
>> fs/resctrl/ctrlmondata.c | 660 +++
>> fs/resctrl/internal.h | 435 ++
>> fs/resctrl/monitor.c | 933 ++++
>> fs/resctrl/monitor_trace.h | 33 +
>> fs/resctrl/pseudo_lock.c | 1104 +++++
>> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
>> include/linux/resctrl.h | 216 +-
>> include/linux/resctrl_types.h | 59 +
>> 29 files changed, 7992 insertions(+), 7263 deletions(-)
>> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h}
>> (56%)
>> create mode 100644 fs/resctrl/Kconfig
>> create mode 100644 fs/resctrl/Makefile
>> create mode 100644 fs/resctrl/ctrlmondata.c
>> create mode 100644 fs/resctrl/internal.h
>> create mode 100644 fs/resctrl/monitor.c
>> create mode 100644 fs/resctrl/monitor_trace.h
>> create mode 100644 fs/resctrl/pseudo_lock.c
>> create mode 100644 fs/resctrl/rdtgroup.c
>> create mode 100644 include/linux/resctrl_types.h
>>
>> --
>> 2.39.5
>>
>
> On 3/1/2025 1:28 AM, James Morse wrote:
>> Changes since v6?: * All the excitement is in patch 37, turns out
>> there are two rmdir() paths that don't join up. The last eight
>> patches are new: * The python script has been replaced with the patch
>> that it generates, see the bare branch below
>>
>> Changes since v6?:
>> * All the excitement is in patch 37, turns out there are two
>> rmdir() paths
>> that don't join up.
>> The last eight patches are new:
>> * The python script has been replaced with the patch that it
>> generates, see
>> the bare branch below if you want to regenerate it.
>> * There have been comments on the followup to the generated patch,
>> those are
>> included here - I suggest they be squashed into the generated patch.
>> * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events,
>> there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to
>> resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability
>> to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of
>> resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=>
>> mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=>
>> mpam/move_to_fs/v7_bare
>>
>>
>> As ever - bugs welcome,
>> Thanks,
>>
>> James
>>
>> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
>>
>> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
>>
>> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
>>
>> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
>>
>> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
>>
>> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
>>
>> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>>
>>
>> Amit Singh Tomar (1):
>> x86/resctrl: Remove the limit on the number of CLOSID
>>
>> Dave Martin (3):
>> x86/resctrl: Squelch whitespace anomalies in resctrl core code
>> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in
>> rdt_init_fs_context()
>> x86/resctrl: Relax some asm #includes
>>
>> James Morse (45):
>> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>> monitors
>> x86/resctrl: Add a helper to avoid reaching into the arch code
>> resource list
>> x86/resctrl: Remove fflags from struct rdt_resource
>> x86/resctrl: Use schema type to determine how to parse schema values
>> x86/resctrl: Use schema type to determine the schema format string
>> x86/resctrl: Remove data_width and the tabular format
>> x86/resctrl: Add max_bw to struct resctrl_membw
>> x86/resctrl: Generate default_ctrl instead of sharing it
>> x86/resctrl: Add helper for setting CPU default properties
>> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>> x86/resctrl: Expose resctrl fs's init function to the rest of the
>> kernel
>> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>> x86/resctrl: Move resctrl types to a separate header
>> x86/resctrl: Add an arch helper to reset one resource
>> x86/resctrl: Move monitor exit work to a resctrl exit call
>> x86/resctrl: Move monitor init work to a resctrl init call
>> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>> x86/resctrl: Change mon_event_config_{read,write}() to be arch
>> helpers
>> x86/resctrl: Move mba_mbps_default_event init to filesystem code
>> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>> x86/resctrl: Allow an architecture to disable pseudo lock
>> x86/resctrl: Make prefetch_disable_bits belong to the arch code
>> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>> x86/resctrl: Move RFTYPE flags to be managed by resctrl
>> x86/resctrl: Handle throttle_mode for SMBA resources
>> x86/resctrl: Move get_config_index() to a header
>> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>> callers
>> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount
>> point
>> x86/resctrl: Drop __init/__exit on assorted symbols
>> x86/resctrl: Move is_mba_sc() out of core.c
>> x86/resctrl: Add end-marker to the resctrl_event_id enum
>> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>> x86/resctrl: Remove a newline to avoid confusing the code move script
>> x86/resctrl: Split trace.h
>> fs/resctrl: Add boiler plate for external resctrl code
>> x86/resctrl: Move the filesystem bits to headers visible to
>> fs/resctrl
>> x86,fs/resctrl: Move the resctrl filesystem code to live in
>> /fs/resctrl
>> x86,fs/resctrl: Remove duplicated trace header files
>> fs/resctrl: Remove unnecessary includes
>> fs/resctrl: Change internal.h's header guard macros
>> x86,fs/resctrl: Move resctrl.rst to live under
>> Documentation/filesystems
>>
>> Documentation/arch/x86/index.rst | 1 -
>> Documentation/filesystems/index.rst | 1 +
>> .../{arch/x86 => filesystems}/resctrl.rst | 0
>> MAINTAINERS | 4 +-
>> arch/Kconfig | 8 +
>> arch/x86/Kconfig | 6 +-
>> arch/x86/include/asm/resctrl.h | 43 +-
>> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
>> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
>> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
>> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
>> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
>> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
>> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
>> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
>> arch/x86/kernel/process_32.c | 2 +-
>> arch/x86/kernel/process_64.c | 2 +-
>> fs/Kconfig | 1 +
>> fs/Makefile | 1 +
>> fs/resctrl/Kconfig | 39 +
>> fs/resctrl/Makefile | 6 +
>> fs/resctrl/ctrlmondata.c | 660 +++
>> fs/resctrl/internal.h | 435 ++
>> fs/resctrl/monitor.c | 933 ++++
>> fs/resctrl/monitor_trace.h | 33 +
>> fs/resctrl/pseudo_lock.c | 1104 +++++
>> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
>> include/linux/resctrl.h | 216 +-
>> include/linux/resctrl_types.h | 59 +
>> 29 files changed, 7992 insertions(+), 7263 deletions(-)
>> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h}
>> (56%)
>> create mode 100644 fs/resctrl/Kconfig
>> create mode 100644 fs/resctrl/Makefile
>> create mode 100644 fs/resctrl/ctrlmondata.c
>> create mode 100644 fs/resctrl/internal.h
>> create mode 100644 fs/resctrl/monitor.c
>> create mode 100644 fs/resctrl/monitor_trace.h
>> create mode 100644 fs/resctrl/pseudo_lock.c
>> create mode 100644 fs/resctrl/rdtgroup.c
>> create mode 100644 include/linux/resctrl_types.h
>>
>> --
>> 2.39.5
>>
Hi Amit, On 07/03/2025 13:50, Amit Singh Tomar wrote: > On 3/7/2025 3:57 PM, Amit Singh Tomar wrote: >> Changes since v6?: >> >>> * All the excitement is in patch 37, turns out there are two rmdir() paths >>> that don't join up. >>> The last eight patches are new: >>> * The python script has been replaced with the patch that it generates, see >>> the bare branch below if you want to regenerate it. >>> * There have been comments on the followup to the generated patch, those are >>> included here - I suggest they be squashed into the generated patch. >>> * This version includes some checkpatch linting from Dave. >>> >>> --- >>> This series renames functions and moves code around. With the >>> exception of invalid configurations for the configurable-events, there should >>> be no changes in behaviour caused by this series. It is now possible for >>> throttle_mode to report 'undefined', but no known platform will do this. >>> >>> The driving pattern is to make things like struct rdtgroup private to resctrl. >>> Features like pseudo-lock aren't going to work on arm64, the ability to disable >>> it at compile time is added. >>> >>> After this, I can start posting the MPAM driver to make use of resctrl on arm64. >>> (What's MPAM? See the cover letter of the first series. [1]) >>> >>> This series is based on v6.14-rc3 and can be retrieved from: >>> https://urldefense.proofpoint.com/v2/url? >>> u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7 >>> or for those who want to regnerate the patch that moves all the code: >> >> After rebasing mpam/snapshot/v6.14-rc1 on top of this series, Hmmm - right, because this series doesn't contain the python script that generates patch-45, so git can't know that all the code is the same. >> Tested a few MPAM >> controls, including Cache Portion Partitioning and Memory Bandwidth Partitioning, on >> Marvell CN10K ARM64 platform, and It looks good. Thanks! >> For this patch-set: >> Tested-by: amitsinght@marvell.com > Realized I used an incorrect format for the Tested-by tag, correcting it now > > Tested-by: Amit Singh Tomar <amitsinght@marvell.com> I'll add an '# arm64' suffix on that as that's what got tested. Thanks, Jaems
Hi James, I have tested this patch series w/o MPAM patches on the Grace server platform. Validated both the features CPOR and MBW, results as expected. Tested-by: Shanker Donthineni <sdonthineni@nvidia.com> -Shanker
Typo, tested with MPAM patches. On 3/7/25 10:38, Shanker Donthineni wrote: > > Hi James, > > I have tested this patch series w/ MPAM patches on the Grace server platform. > Validated both the features CPOR and MBW, results as expected. > > Tested-by: Shanker Donthineni <sdonthineni@nvidia.com> > > > -Shanker
Hi Shanker, On 07/03/2025 16:50, Shanker Donthineni wrote: > On 3/7/25 10:38, Shanker Donthineni wrote: >> I have tested this patch series w/ MPAM patches on the Grace server platform. >> Validated both the features CPOR and MBW, results as expected. > Typo, tested with MPAM patches. >> Tested-by: Shanker Donthineni <sdonthineni@nvidia.com> Thanks! (as noted elsewhere - I've added an '# arm64' suffix to this) James
On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
> Changes since v6?:
> * All the excitement is in patch 37, turns out there are two rmdir() paths
> that don't join up.
> The last eight patches are new:
> * The python script has been replaced with the patch that it generates, see
> the bare branch below if you want to regenerate it.
> * There have been comments on the followup to the generated patch, those are
> included here - I suggest they be squashed into the generated patch.
> * This version includes some checkpatch linting from Dave.
So, Reinette says that 1-30 should be ready to go. Care to send them ASAP with
all the review feedback addressed so that I can try to queue them, we all test
the branch this week and thus I can empty a considerable amount out of your
bucket of patches...
Thx.
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Hi Boris, On 10/03/2025 19:09, Borislav Petkov wrote: > On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote: >> Changes since v6?: >> * All the excitement is in patch 37, turns out there are two rmdir() paths >> that don't join up. >> The last eight patches are new: >> * The python script has been replaced with the patch that it generates, see >> the bare branch below if you want to regenerate it. >> * There have been comments on the followup to the generated patch, those are >> included here - I suggest they be squashed into the generated patch. >> * This version includes some checkpatch linting from Dave. > > So, Reinette says that 1-30 should be ready to go. Care to send them ASAP with > all the review feedback addressed so that I can try to queue them, Thanks - look out for a 'v8:for_boris'. > we all test > the branch this week and thus I can empty a considerable amount out of your > bucket of patches... Thanks! James
On Tue, Mar 11, 2025 at 06:38:44PM +0000, James Morse wrote:
> Thanks - look out for a 'v8:for_boris'.
Got it, working through it slowly.
Thx!
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Hi James,
On Fri, Feb 28, 2025 at 8:59 PM James Morse <james.morse@arm.com> wrote:
>
> Changes since v6?:
> * All the excitement is in patch 37, turns out there are two rmdir() paths
> that don't join up.
> The last eight patches are new:
> * The python script has been replaced with the patch that it generates, see
> the bare branch below if you want to regenerate it.
> * There have been comments on the followup to the generated patch, those are
> included here - I suggest they be squashed into the generated patch.
> * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
> [v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
> [v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
> [v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
> [v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
> [v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
> [1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/
>
> Amit Singh Tomar (1):
> x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
> x86/resctrl: Squelch whitespace anomalies in resctrl core code
> x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
> x86/resctrl: Relax some asm #includes
>
> James Morse (45):
> x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
> monitors
> x86/resctrl: Add a helper to avoid reaching into the arch code
> resource list
> x86/resctrl: Remove fflags from struct rdt_resource
> x86/resctrl: Use schema type to determine how to parse schema values
> x86/resctrl: Use schema type to determine the schema format string
> x86/resctrl: Remove data_width and the tabular format
> x86/resctrl: Add max_bw to struct resctrl_membw
> x86/resctrl: Generate default_ctrl instead of sharing it
> x86/resctrl: Add helper for setting CPU default properties
> x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
> x86/resctrl: Expose resctrl fs's init function to the rest of the
> kernel
> x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
> x86/resctrl: Move resctrl types to a separate header
> x86/resctrl: Add an arch helper to reset one resource
> x86/resctrl: Move monitor exit work to a resctrl exit call
> x86/resctrl: Move monitor init work to a resctrl init call
> x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
> x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
> x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
> x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
> x86/resctrl: Move mba_mbps_default_event init to filesystem code
> x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
> x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
> x86/resctrl: Allow an architecture to disable pseudo lock
> x86/resctrl: Make prefetch_disable_bits belong to the arch code
> x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
> x86/resctrl: Move RFTYPE flags to be managed by resctrl
> x86/resctrl: Handle throttle_mode for SMBA resources
> x86/resctrl: Move get_config_index() to a header
> x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
> callers
> x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
> x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
> x86/resctrl: Drop __init/__exit on assorted symbols
> x86/resctrl: Move is_mba_sc() out of core.c
> x86/resctrl: Add end-marker to the resctrl_event_id enum
> x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
> x86/resctrl: Remove a newline to avoid confusing the code move script
> x86/resctrl: Split trace.h
> fs/resctrl: Add boiler plate for external resctrl code
> x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
> x86,fs/resctrl: Move the resctrl filesystem code to live in
> /fs/resctrl
> x86,fs/resctrl: Remove duplicated trace header files
> fs/resctrl: Remove unnecessary includes
> fs/resctrl: Change internal.h's header guard macros
> x86,fs/resctrl: Move resctrl.rst to live under
> Documentation/filesystems
>
> Documentation/arch/x86/index.rst | 1 -
> Documentation/filesystems/index.rst | 1 +
> .../{arch/x86 => filesystems}/resctrl.rst | 0
> MAINTAINERS | 4 +-
> arch/Kconfig | 8 +
> arch/x86/Kconfig | 6 +-
> arch/x86/include/asm/resctrl.h | 43 +-
> arch/x86/kernel/cpu/resctrl/Makefile | 8 +-
> arch/x86/kernel/cpu/resctrl/core.c | 214 +-
> arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 606 +--
> arch/x86/kernel/cpu/resctrl/internal.h | 504 +-
> arch/x86/kernel/cpu/resctrl/monitor.c | 863 +---
> arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 1120 +----
> .../resctrl/{trace.h => pseudo_lock_trace.h} | 26 +-
> arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4031 +--------------
> arch/x86/kernel/process_32.c | 2 +-
> arch/x86/kernel/process_64.c | 2 +-
> fs/Kconfig | 1 +
> fs/Makefile | 1 +
> fs/resctrl/Kconfig | 39 +
> fs/resctrl/Makefile | 6 +
> fs/resctrl/ctrlmondata.c | 660 +++
> fs/resctrl/internal.h | 435 ++
> fs/resctrl/monitor.c | 933 ++++
> fs/resctrl/monitor_trace.h | 33 +
> fs/resctrl/pseudo_lock.c | 1104 +++++
> fs/resctrl/rdtgroup.c | 4329 +++++++++++++++++
> include/linux/resctrl.h | 216 +-
> include/linux/resctrl_types.h | 59 +
> 29 files changed, 7992 insertions(+), 7263 deletions(-)
> rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
> rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
> create mode 100644 fs/resctrl/Kconfig
> create mode 100644 fs/resctrl/Makefile
> create mode 100644 fs/resctrl/ctrlmondata.c
> create mode 100644 fs/resctrl/internal.h
> create mode 100644 fs/resctrl/monitor.c
> create mode 100644 fs/resctrl/monitor_trace.h
> create mode 100644 fs/resctrl/pseudo_lock.c
> create mode 100644 fs/resctrl/rdtgroup.c
> create mode 100644 include/linux/resctrl_types.h
>
> --
> 2.39.5
>
I applied the series successfully and ran through my usual assortment
of container management-oriented testcases on the following
implementations:
* AMD EPYC 7B12 64-Core Processor
* Intel(R) Xeon(R) Gold 6268CL CPU @ 2.80GHz
Everything looked good.
Tested-by: Peter Newman <peternewman@google.com>
Thanks!
-Peter
Hi Peter, On 03/03/2025 10:14, Peter Newman wrote: > On Fri, Feb 28, 2025 at 8:59 PM James Morse <james.morse@arm.com> wrote: >> >> Changes since v6?: >> * All the excitement is in patch 37, turns out there are two rmdir() paths >> that don't join up. >> The last eight patches are new: >> * The python script has been replaced with the patch that it generates, see >> the bare branch below if you want to regenerate it. >> * There have been comments on the followup to the generated patch, those are >> included here - I suggest they be squashed into the generated patch. >> * This version includes some checkpatch linting from Dave. >> >> --- >> This series renames functions and moves code around. With the >> exception of invalid configurations for the configurable-events, there should >> be no changes in behaviour caused by this series. It is now possible for >> throttle_mode to report 'undefined', but no known platform will do this. >> >> The driving pattern is to make things like struct rdtgroup private to resctrl. >> Features like pseudo-lock aren't going to work on arm64, the ability to disable >> it at compile time is added. >> >> After this, I can start posting the MPAM driver to make use of resctrl on arm64. >> (What's MPAM? See the cover letter of the first series. [1]) >> >> This series is based on v6.14-rc3 and can be retrieved from: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7 >> or for those who want to regnerate the patch that moves all the code: >> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare > I applied the series successfully and ran through my usual assortment > of container management-oriented testcases on the following > implementations: > * AMD EPYC 7B12 64-Core Processor Great! This is something I've not managed to get my hands on. > * Intel(R) Xeon(R) Gold 6268CL CPU @ 2.80GHz > > Everything looked good. > > Tested-by: Peter Newman <peternewman@google.com> Thanks! James
© 2016 - 2026 Red Hat, Inc.