mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2025-01-25 10:40:01 +07:00
aefa5688c0
upatepp can get called for a nohpte fault when we find from the linux page table that the translation was hashed before. In that case we are sure that there is no existing translation, hence we could avoid doing tlbie. We could possibly race with a parallel fault filling the TLB. But that should be ok because updatepp is only ever relaxing permissions. We also look at linux pte permission bits when filling hash pte permission bits. We also hold the linux pte busy bits while inserting/updating a hashpte entry, hence a paralle update of linux pte is not possible. On the other hand mprotect involves ptep_modify_prot_start which cause a hpte invalidate and not updatepp. Performance number: We use randbox_access_bench written by Anton. Kernel with THP disabled and smaller hash page table size. 86.60% random_access_b [kernel.kallsyms] [k] .native_hpte_updatepp 2.10% random_access_b random_access_bench [.] doit 1.99% random_access_b [kernel.kallsyms] [k] .do_raw_spin_lock 1.85% random_access_b [kernel.kallsyms] [k] .native_hpte_insert 1.26% random_access_b [kernel.kallsyms] [k] .native_flush_hash_range 1.18% random_access_b [kernel.kallsyms] [k] .__delay 0.69% random_access_b [kernel.kallsyms] [k] .native_hpte_remove 0.37% random_access_b [kernel.kallsyms] [k] .clear_user_page 0.34% random_access_b [kernel.kallsyms] [k] .__hash_page_64K 0.32% random_access_b [kernel.kallsyms] [k] fast_exception_return 0.30% random_access_b [kernel.kallsyms] [k] .hash_page_mm With Fix: 27.54% random_access_b random_access_bench [.] doit 22.90% random_access_b [kernel.kallsyms] [k] .native_hpte_insert 5.76% random_access_b [kernel.kallsyms] [k] .native_hpte_remove 5.20% random_access_b [kernel.kallsyms] [k] fast_exception_return 5.12% random_access_b [kernel.kallsyms] [k] .__hash_page_64K 4.80% random_access_b [kernel.kallsyms] [k] .hash_page_mm 3.31% random_access_b [kernel.kallsyms] [k] data_access_common 1.84% random_access_b [kernel.kallsyms] [k] .trace_hardirqs_on_caller Signed-off-by: Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
446 lines
12 KiB
C
446 lines
12 KiB
C
/*
|
|
* "Cell Reference Set" HTAB support.
|
|
*
|
|
* (C) Copyright 2006-2007 TOSHIBA CORPORATION
|
|
*
|
|
* This code is based on arch/powerpc/platforms/pseries/lpar.c:
|
|
* Copyright (C) 2001 Todd Inglett, IBM Corporation
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*/
|
|
|
|
#undef DEBUG_LOW
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <asm/mmu.h>
|
|
#include <asm/page.h>
|
|
#include <asm/pgtable.h>
|
|
#include <asm/machdep.h>
|
|
#include <asm/udbg.h>
|
|
|
|
#include "beat_wrapper.h"
|
|
|
|
#ifdef DEBUG_LOW
|
|
#define DBG_LOW(fmt...) do { udbg_printf(fmt); } while (0)
|
|
#else
|
|
#define DBG_LOW(fmt...) do { } while (0)
|
|
#endif
|
|
|
|
static DEFINE_RAW_SPINLOCK(beat_htab_lock);
|
|
|
|
static inline unsigned int beat_read_mask(unsigned hpte_group)
|
|
{
|
|
unsigned long rmask = 0;
|
|
u64 hpte_v[5];
|
|
|
|
beat_read_htab_entries(0, hpte_group + 0, hpte_v);
|
|
if (!(hpte_v[0] & HPTE_V_BOLTED))
|
|
rmask |= 0x8000;
|
|
if (!(hpte_v[1] & HPTE_V_BOLTED))
|
|
rmask |= 0x4000;
|
|
if (!(hpte_v[2] & HPTE_V_BOLTED))
|
|
rmask |= 0x2000;
|
|
if (!(hpte_v[3] & HPTE_V_BOLTED))
|
|
rmask |= 0x1000;
|
|
beat_read_htab_entries(0, hpte_group + 4, hpte_v);
|
|
if (!(hpte_v[0] & HPTE_V_BOLTED))
|
|
rmask |= 0x0800;
|
|
if (!(hpte_v[1] & HPTE_V_BOLTED))
|
|
rmask |= 0x0400;
|
|
if (!(hpte_v[2] & HPTE_V_BOLTED))
|
|
rmask |= 0x0200;
|
|
if (!(hpte_v[3] & HPTE_V_BOLTED))
|
|
rmask |= 0x0100;
|
|
hpte_group = ~hpte_group & (htab_hash_mask * HPTES_PER_GROUP);
|
|
beat_read_htab_entries(0, hpte_group + 0, hpte_v);
|
|
if (!(hpte_v[0] & HPTE_V_BOLTED))
|
|
rmask |= 0x80;
|
|
if (!(hpte_v[1] & HPTE_V_BOLTED))
|
|
rmask |= 0x40;
|
|
if (!(hpte_v[2] & HPTE_V_BOLTED))
|
|
rmask |= 0x20;
|
|
if (!(hpte_v[3] & HPTE_V_BOLTED))
|
|
rmask |= 0x10;
|
|
beat_read_htab_entries(0, hpte_group + 4, hpte_v);
|
|
if (!(hpte_v[0] & HPTE_V_BOLTED))
|
|
rmask |= 0x08;
|
|
if (!(hpte_v[1] & HPTE_V_BOLTED))
|
|
rmask |= 0x04;
|
|
if (!(hpte_v[2] & HPTE_V_BOLTED))
|
|
rmask |= 0x02;
|
|
if (!(hpte_v[3] & HPTE_V_BOLTED))
|
|
rmask |= 0x01;
|
|
return rmask;
|
|
}
|
|
|
|
static long beat_lpar_hpte_insert(unsigned long hpte_group,
|
|
unsigned long vpn, unsigned long pa,
|
|
unsigned long rflags, unsigned long vflags,
|
|
int psize, int apsize, int ssize)
|
|
{
|
|
unsigned long lpar_rc;
|
|
u64 hpte_v, hpte_r, slot;
|
|
|
|
if (vflags & HPTE_V_SECONDARY)
|
|
return -1;
|
|
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW("hpte_insert(group=%lx, va=%016lx, pa=%016lx, "
|
|
"rflags=%lx, vflags=%lx, psize=%d)\n",
|
|
hpte_group, va, pa, rflags, vflags, psize);
|
|
|
|
hpte_v = hpte_encode_v(vpn, psize, apsize, MMU_SEGSIZE_256M) |
|
|
vflags | HPTE_V_VALID;
|
|
hpte_r = hpte_encode_r(pa, psize, apsize) | rflags;
|
|
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" hpte_v=%016lx, hpte_r=%016lx\n", hpte_v, hpte_r);
|
|
|
|
if (rflags & _PAGE_NO_CACHE)
|
|
hpte_r &= ~HPTE_R_M;
|
|
|
|
raw_spin_lock(&beat_htab_lock);
|
|
lpar_rc = beat_read_mask(hpte_group);
|
|
if (lpar_rc == 0) {
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" full\n");
|
|
raw_spin_unlock(&beat_htab_lock);
|
|
return -1;
|
|
}
|
|
|
|
lpar_rc = beat_insert_htab_entry(0, hpte_group, lpar_rc << 48,
|
|
hpte_v, hpte_r, &slot);
|
|
raw_spin_unlock(&beat_htab_lock);
|
|
|
|
/*
|
|
* Since we try and ioremap PHBs we don't own, the pte insert
|
|
* will fail. However we must catch the failure in hash_page
|
|
* or we will loop forever, so return -2 in this case.
|
|
*/
|
|
if (unlikely(lpar_rc != 0)) {
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" lpar err %lx\n", lpar_rc);
|
|
return -2;
|
|
}
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" -> slot: %lx\n", slot);
|
|
|
|
/* We have to pass down the secondary bucket bit here as well */
|
|
return (slot ^ hpte_group) & 15;
|
|
}
|
|
|
|
static long beat_lpar_hpte_remove(unsigned long hpte_group)
|
|
{
|
|
DBG_LOW("hpte_remove(group=%lx)\n", hpte_group);
|
|
return -1;
|
|
}
|
|
|
|
static unsigned long beat_lpar_hpte_getword0(unsigned long slot)
|
|
{
|
|
unsigned long dword0;
|
|
unsigned long lpar_rc;
|
|
u64 dword[5];
|
|
|
|
lpar_rc = beat_read_htab_entries(0, slot & ~3UL, dword);
|
|
|
|
dword0 = dword[slot&3];
|
|
|
|
BUG_ON(lpar_rc != 0);
|
|
|
|
return dword0;
|
|
}
|
|
|
|
static void beat_lpar_hptab_clear(void)
|
|
{
|
|
unsigned long size_bytes = 1UL << ppc64_pft_size;
|
|
unsigned long hpte_count = size_bytes >> 4;
|
|
int i;
|
|
u64 dummy0, dummy1;
|
|
|
|
/* TODO: Use bulk call */
|
|
for (i = 0; i < hpte_count; i++)
|
|
beat_write_htab_entry(0, i, 0, 0, -1UL, -1UL, &dummy0, &dummy1);
|
|
}
|
|
|
|
/*
|
|
* NOTE: for updatepp ops we are fortunate that the linux "newpp" bits and
|
|
* the low 3 bits of flags happen to line up. So no transform is needed.
|
|
* We can probably optimize here and assume the high bits of newpp are
|
|
* already zero. For now I am paranoid.
|
|
*/
|
|
static long beat_lpar_hpte_updatepp(unsigned long slot,
|
|
unsigned long newpp,
|
|
unsigned long vpn,
|
|
int psize, int apsize,
|
|
int ssize, unsigned long flags)
|
|
{
|
|
unsigned long lpar_rc;
|
|
u64 dummy0, dummy1;
|
|
unsigned long want_v;
|
|
|
|
want_v = hpte_encode_avpn(vpn, psize, MMU_SEGSIZE_256M);
|
|
|
|
DBG_LOW(" update: "
|
|
"avpnv=%016lx, slot=%016lx, psize: %d, newpp %016lx ... ",
|
|
want_v & HPTE_V_AVPN, slot, psize, newpp);
|
|
|
|
raw_spin_lock(&beat_htab_lock);
|
|
dummy0 = beat_lpar_hpte_getword0(slot);
|
|
if ((dummy0 & ~0x7FUL) != (want_v & ~0x7FUL)) {
|
|
DBG_LOW("not found !\n");
|
|
raw_spin_unlock(&beat_htab_lock);
|
|
return -1;
|
|
}
|
|
|
|
lpar_rc = beat_write_htab_entry(0, slot, 0, newpp, 0, 7, &dummy0,
|
|
&dummy1);
|
|
raw_spin_unlock(&beat_htab_lock);
|
|
if (lpar_rc != 0 || dummy0 == 0) {
|
|
DBG_LOW("not found !\n");
|
|
return -1;
|
|
}
|
|
|
|
DBG_LOW("ok %lx %lx\n", dummy0, dummy1);
|
|
|
|
BUG_ON(lpar_rc != 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static long beat_lpar_hpte_find(unsigned long vpn, int psize)
|
|
{
|
|
unsigned long hash;
|
|
unsigned long i, j;
|
|
long slot;
|
|
unsigned long want_v, hpte_v;
|
|
|
|
hash = hpt_hash(vpn, mmu_psize_defs[psize].shift, MMU_SEGSIZE_256M);
|
|
want_v = hpte_encode_avpn(vpn, psize, MMU_SEGSIZE_256M);
|
|
|
|
for (j = 0; j < 2; j++) {
|
|
slot = (hash & htab_hash_mask) * HPTES_PER_GROUP;
|
|
for (i = 0; i < HPTES_PER_GROUP; i++) {
|
|
hpte_v = beat_lpar_hpte_getword0(slot);
|
|
|
|
if (HPTE_V_COMPARE(hpte_v, want_v)
|
|
&& (hpte_v & HPTE_V_VALID)
|
|
&& (!!(hpte_v & HPTE_V_SECONDARY) == j)) {
|
|
/* HPTE matches */
|
|
if (j)
|
|
slot = -slot;
|
|
return slot;
|
|
}
|
|
++slot;
|
|
}
|
|
hash = ~hash;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
static void beat_lpar_hpte_updateboltedpp(unsigned long newpp,
|
|
unsigned long ea,
|
|
int psize, int ssize)
|
|
{
|
|
unsigned long vpn;
|
|
unsigned long lpar_rc, slot, vsid;
|
|
u64 dummy0, dummy1;
|
|
|
|
vsid = get_kernel_vsid(ea, MMU_SEGSIZE_256M);
|
|
vpn = hpt_vpn(ea, vsid, MMU_SEGSIZE_256M);
|
|
|
|
raw_spin_lock(&beat_htab_lock);
|
|
slot = beat_lpar_hpte_find(vpn, psize);
|
|
BUG_ON(slot == -1);
|
|
|
|
lpar_rc = beat_write_htab_entry(0, slot, 0, newpp, 0, 7,
|
|
&dummy0, &dummy1);
|
|
raw_spin_unlock(&beat_htab_lock);
|
|
|
|
BUG_ON(lpar_rc != 0);
|
|
}
|
|
|
|
static void beat_lpar_hpte_invalidate(unsigned long slot, unsigned long vpn,
|
|
int psize, int apsize,
|
|
int ssize, int local)
|
|
{
|
|
unsigned long want_v;
|
|
unsigned long lpar_rc;
|
|
u64 dummy1, dummy2;
|
|
unsigned long flags;
|
|
|
|
DBG_LOW(" inval : slot=%lx, va=%016lx, psize: %d, local: %d\n",
|
|
slot, va, psize, local);
|
|
want_v = hpte_encode_avpn(vpn, psize, MMU_SEGSIZE_256M);
|
|
|
|
raw_spin_lock_irqsave(&beat_htab_lock, flags);
|
|
dummy1 = beat_lpar_hpte_getword0(slot);
|
|
|
|
if ((dummy1 & ~0x7FUL) != (want_v & ~0x7FUL)) {
|
|
DBG_LOW("not found !\n");
|
|
raw_spin_unlock_irqrestore(&beat_htab_lock, flags);
|
|
return;
|
|
}
|
|
|
|
lpar_rc = beat_write_htab_entry(0, slot, 0, 0, HPTE_V_VALID, 0,
|
|
&dummy1, &dummy2);
|
|
raw_spin_unlock_irqrestore(&beat_htab_lock, flags);
|
|
|
|
BUG_ON(lpar_rc != 0);
|
|
}
|
|
|
|
void __init hpte_init_beat(void)
|
|
{
|
|
ppc_md.hpte_invalidate = beat_lpar_hpte_invalidate;
|
|
ppc_md.hpte_updatepp = beat_lpar_hpte_updatepp;
|
|
ppc_md.hpte_updateboltedpp = beat_lpar_hpte_updateboltedpp;
|
|
ppc_md.hpte_insert = beat_lpar_hpte_insert;
|
|
ppc_md.hpte_remove = beat_lpar_hpte_remove;
|
|
ppc_md.hpte_clear_all = beat_lpar_hptab_clear;
|
|
}
|
|
|
|
static long beat_lpar_hpte_insert_v3(unsigned long hpte_group,
|
|
unsigned long vpn, unsigned long pa,
|
|
unsigned long rflags, unsigned long vflags,
|
|
int psize, int apsize, int ssize)
|
|
{
|
|
unsigned long lpar_rc;
|
|
u64 hpte_v, hpte_r, slot;
|
|
|
|
if (vflags & HPTE_V_SECONDARY)
|
|
return -1;
|
|
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW("hpte_insert(group=%lx, vpn=%016lx, pa=%016lx, "
|
|
"rflags=%lx, vflags=%lx, psize=%d)\n",
|
|
hpte_group, vpn, pa, rflags, vflags, psize);
|
|
|
|
hpte_v = hpte_encode_v(vpn, psize, apsize, MMU_SEGSIZE_256M) |
|
|
vflags | HPTE_V_VALID;
|
|
hpte_r = hpte_encode_r(pa, psize, apsize) | rflags;
|
|
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" hpte_v=%016lx, hpte_r=%016lx\n", hpte_v, hpte_r);
|
|
|
|
if (rflags & _PAGE_NO_CACHE)
|
|
hpte_r &= ~HPTE_R_M;
|
|
|
|
/* insert into not-volted entry */
|
|
lpar_rc = beat_insert_htab_entry3(0, hpte_group, hpte_v, hpte_r,
|
|
HPTE_V_BOLTED, 0, &slot);
|
|
/*
|
|
* Since we try and ioremap PHBs we don't own, the pte insert
|
|
* will fail. However we must catch the failure in hash_page
|
|
* or we will loop forever, so return -2 in this case.
|
|
*/
|
|
if (unlikely(lpar_rc != 0)) {
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" lpar err %lx\n", lpar_rc);
|
|
return -2;
|
|
}
|
|
if (!(vflags & HPTE_V_BOLTED))
|
|
DBG_LOW(" -> slot: %lx\n", slot);
|
|
|
|
/* We have to pass down the secondary bucket bit here as well */
|
|
return (slot ^ hpte_group) & 15;
|
|
}
|
|
|
|
/*
|
|
* NOTE: for updatepp ops we are fortunate that the linux "newpp" bits and
|
|
* the low 3 bits of flags happen to line up. So no transform is needed.
|
|
* We can probably optimize here and assume the high bits of newpp are
|
|
* already zero. For now I am paranoid.
|
|
*/
|
|
static long beat_lpar_hpte_updatepp_v3(unsigned long slot,
|
|
unsigned long newpp,
|
|
unsigned long vpn,
|
|
int psize, int apsize,
|
|
int ssize, unsigned long flags)
|
|
{
|
|
unsigned long lpar_rc;
|
|
unsigned long want_v;
|
|
unsigned long pss;
|
|
|
|
want_v = hpte_encode_avpn(vpn, psize, MMU_SEGSIZE_256M);
|
|
pss = (psize == MMU_PAGE_4K) ? -1UL : mmu_psize_defs[psize].penc[psize];
|
|
|
|
DBG_LOW(" update: "
|
|
"avpnv=%016lx, slot=%016lx, psize: %d, newpp %016lx ... ",
|
|
want_v & HPTE_V_AVPN, slot, psize, newpp);
|
|
|
|
lpar_rc = beat_update_htab_permission3(0, slot, want_v, pss, 7, newpp);
|
|
|
|
if (lpar_rc == 0xfffffff7) {
|
|
DBG_LOW("not found !\n");
|
|
return -1;
|
|
}
|
|
|
|
DBG_LOW("ok\n");
|
|
|
|
BUG_ON(lpar_rc != 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void beat_lpar_hpte_invalidate_v3(unsigned long slot, unsigned long vpn,
|
|
int psize, int apsize,
|
|
int ssize, int local)
|
|
{
|
|
unsigned long want_v;
|
|
unsigned long lpar_rc;
|
|
unsigned long pss;
|
|
|
|
DBG_LOW(" inval : slot=%lx, vpn=%016lx, psize: %d, local: %d\n",
|
|
slot, vpn, psize, local);
|
|
want_v = hpte_encode_avpn(vpn, psize, MMU_SEGSIZE_256M);
|
|
pss = (psize == MMU_PAGE_4K) ? -1UL : mmu_psize_defs[psize].penc[psize];
|
|
|
|
lpar_rc = beat_invalidate_htab_entry3(0, slot, want_v, pss);
|
|
|
|
/* E_busy can be valid output: page may be already replaced */
|
|
BUG_ON(lpar_rc != 0 && lpar_rc != 0xfffffff7);
|
|
}
|
|
|
|
static int64_t _beat_lpar_hptab_clear_v3(void)
|
|
{
|
|
return beat_clear_htab3(0);
|
|
}
|
|
|
|
static void beat_lpar_hptab_clear_v3(void)
|
|
{
|
|
_beat_lpar_hptab_clear_v3();
|
|
}
|
|
|
|
void __init hpte_init_beat_v3(void)
|
|
{
|
|
if (_beat_lpar_hptab_clear_v3() == 0) {
|
|
ppc_md.hpte_invalidate = beat_lpar_hpte_invalidate_v3;
|
|
ppc_md.hpte_updatepp = beat_lpar_hpte_updatepp_v3;
|
|
ppc_md.hpte_updateboltedpp = beat_lpar_hpte_updateboltedpp;
|
|
ppc_md.hpte_insert = beat_lpar_hpte_insert_v3;
|
|
ppc_md.hpte_remove = beat_lpar_hpte_remove;
|
|
ppc_md.hpte_clear_all = beat_lpar_hptab_clear_v3;
|
|
} else {
|
|
ppc_md.hpte_invalidate = beat_lpar_hpte_invalidate;
|
|
ppc_md.hpte_updatepp = beat_lpar_hpte_updatepp;
|
|
ppc_md.hpte_updateboltedpp = beat_lpar_hpte_updateboltedpp;
|
|
ppc_md.hpte_insert = beat_lpar_hpte_insert;
|
|
ppc_md.hpte_remove = beat_lpar_hpte_remove;
|
|
ppc_md.hpte_clear_all = beat_lpar_hptab_clear;
|
|
}
|
|
}
|