public inbox for linux-ia64@vger.kernel.org
 help / color / mirror / Atom feed
From: Bjorn Helgaas <bjorn.helgaas@hp.com>
To: linux-ia64@vger.kernel.org
Subject: Re: [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled - take 2
Date: Tue, 04 Sep 2007 19:59:31 +0000	[thread overview]
Message-ID: <200709041359.32545.bjorn.helgaas@hp.com> (raw)
In-Reply-To: <200708301338.34246.protasnb@gmail.com>

On Monday 03 September 2007 02:06:20 am Natalie Protasevich wrote:
> This patch allows to disable ptc.g. The code used to be in the kernel, then was removed 
> in 2.4 since the bug that it was fixing has gone away. However, some large system vendors 
> now want this capability available through a means that can be controlled by the platform 
> in the event that there is an issue with either processor or their chipset where global 
> ptc.g is not operational.  They want the mechanism for future platforms to work around 
> such issues. It is also needed for platform makers when they deliberately do not use the 
> global cache purge in their chipset implementation. (For such cases, Intel provided a SAL 
> table entry to specify if ptc.g is allowed and how many).

This is an area prone to hard-to-reproduce and hard-to-debug problems,
and there's a lot of subtle stuff in this patch.  So I worry about the
fact that we're adding a noptcg path that will be basically untested,
compared with the normal path.

> +static inline void
> +flush_tlb_no_ptcg (unsigned long start, unsigned long end,
> +		    unsigned long nbits)
> +{
> +	extern void smp_send_flush_tlb (void);
> +	unsigned long saved_tpr = 0;
> +	unsigned long flags;
> +	int cpus = num_online_cpus();

This isn't safe with respect to CPU hotplug, is it?  What if a CPU
goes offline between here and the "wait for other CPUs" loop below?

> +	/*
> +	 * Sometimes this is called with interrupts disabled and causes
> +	 * deadlock; to avoid this we enable interrupt and raise the TPR
> +	 * to enable ONLY IPI.
> +	 */

I don't think the comment matches the code.  With TPR, you can mask
interrupts 0x10-0x1f, 0x10-0x2f, 0x10-0x3f, ..., 0x10-0xef, or 0x10-0xff.
So you have to leave at least interrupts 0xf0-0xff unmasked, which
includes IA64_IPI_VECTOR at 0xfe and 15 others.

> +	local_save_flags(flags);
> +	if (!(flags & IA64_PSR_I)) {
> +		saved_tpr = ia64_getreg(_IA64_REG_CR_TPR);
> +		ia64_srlz_d();

Why is this srlz.d needed?

> +		ia64_setreg(_IA64_REG_CR_TPR, saved_tpr);

This just writes back the same value we read above.  It doesn't really
do anything, does it?

> +		ia64_srlz_d();
> +		local_irq_enable();
> +	}
> +
> +	ia64_global_tlb_flush_rid = ia64_get_rr(start);
> +	ia64_srlz_d();

Why is this srlz.d needed?

> +	ia64_global_tlb_flush_start = start;
> +	ia64_global_tlb_flush_end = end;
> +	ia64_global_tlb_flush_nbits = nbits;
> +	atomic_set(&ia64_global_tlb_flush_cpu_count, cpus - 1);
> +	smp_send_flush_tlb();
> +	/*
> +	 * Purge local TLB entries. ALAT invalidation is done in ia64_leave_kernel.
> +	 */
> +	do {
> +		ia64_ptcl(start, nbits<<2);
> +		start += (1UL << nbits);
> +	} while (start < end);
> +
> +	ia64_srlz_i();			/* srlz.i implies srlz.d */
> +
> +	/*
> +	 * Wait for other CPUs to finish purging entries.
> +	 */
> +	while (atomic_read(&ia64_global_tlb_flush_cpu_count)) {
> +		/* Nothing */
> +	}
> +
> +	if (!(flags & IA64_PSR_I)) {
> +		local_irq_disable();
> +	 	ia64_setreg(_IA64_REG_CR_TPR, saved_tpr);
> +		ia64_srlz_d();
> +	}
> +}
> +
>  void
>  ia64_global_tlb_purge (struct mm_struct *mm, unsigned long start,
>  		       unsigned long end, unsigned long nbits)
> diff -puN arch/ia64/kernel/smp.c~ptcg arch/ia64/kernel/smp.c
> --- linux-2.6.23-rc5/arch/ia64/kernel/smp.c~ptcg	2007-09-02 23:58:54.000000000 -0700
> +++ linux-2.6.23-rc5-nataliep/arch/ia64/kernel/smp.c	2007-09-02 23:59:25.000000000 -0700
> @@ -174,6 +175,48 @@ handle_IPI (int irq, void *dev_id)
>  				unw_init_running(kdump_cpu_freeze, NULL);
>  				break;
>  #endif
> +
> +			      case IPI_FLUSH_TLB:
> +			      {
> +				extern unsigned long ia64_global_tlb_flush_start, 
> +				       ia64_global_tlb_flush_end, ia64_global_tlb_flush_nbits, 
> +				       ia64_global_tlb_flush_rid;
> +				extern atomic_t ia64_global_tlb_flush_cpu_count;
> +				unsigned long saved_rid = ia64_get_rr(ia64_global_tlb_flush_start);
> +				unsigned long end = ia64_global_tlb_flush_end;
> +				unsigned long start = ia64_global_tlb_flush_start;
> +				unsigned long nbits = ia64_global_tlb_flush_nbits;
> +	
> +				/*
> +				 * Current CPU may be running with different RID so we need to
> +				 * reload the RID of flushed address.  Purging the translation
> +				 * also needs ALAT invalidation; we do not need "invala" here
> +				 * since it is done in ia64_leave_kernel.
> +				 */
> +				ia64_srlz_d();

Why is this srlz.d needed?

> +				if (saved_rid != ia64_global_tlb_flush_rid) {
> +					ia64_set_rr(ia64_global_tlb_flush_start, ia64_global_tlb_flush_rid);
> +					ia64_srlz_d();
> +				}
> +
> +				do {
> +					/*
> +					 * Purge local TLB entries.
> +				 	 */
> +					ia64_ptcl(start, nbits<<2);
> +					start += (1UL << nbits);
> +				} while (start < end);
> +
> +				ia64_barrier();
> +				ia64_srlz_i();			/* srlz.i implies srlz.d */

Why are these (barrier & srlz.i) needed?

> +				if (saved_rid != ia64_global_tlb_flush_rid) {
> +					ia64_set_rr(ia64_global_tlb_flush_start, saved_rid);
> +					ia64_srlz_d();
> +				}
> +				atomic_dec(&ia64_global_tlb_flush_cpu_count);
> +				break;
> +			      }
>  			      default:
>  				printk(KERN_CRIT "Unknown IPI on CPU %d: %lu\n", this_cpu, which);
>  				break;

  parent reply	other threads:[~2007-09-04 19:59 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-08-30 20:38 [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled Natalie Protasevich
2007-08-31  1:15 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be Zou Nan hai
2007-08-31  1:45 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to bedisabled Luck, Tony
2007-08-31  1:48 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to Zou Nan hai
2007-09-03  8:06 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to bedisabled Natalie Protasevich
2007-09-03  8:06 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled - take 2 Natalie Protasevich
2007-09-03  9:21 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled Jes Sorensen
2007-09-03  9:37 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled - take 2 Jes Sorensen
2007-09-04  8:46 ` Robin Holt
2007-09-04  9:03 ` Luck, Tony
2007-09-04 14:58 ` Natalie Protasevich
2007-09-04 16:05 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled Natalie Protasevich
2007-09-04 19:59 ` Bjorn Helgaas [this message]
2007-09-04 21:20 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled - take 2 Natalie Protasevich
2007-09-05 13:35 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be Jes Sorensen
2007-09-05 13:57 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled Robin Holt
2007-09-05 15:29 ` Natalie Protasevich
2007-09-05 15:47 ` David Mosberger-Tang
2007-09-05 16:01 ` Natalie Protasevich
2007-09-06 16:36 ` David Mosberger-Tang
2007-09-06 18:00 ` Natalie Protasevich
2007-09-07  7:38 ` Luck, Tony
2007-09-07  8:38 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be Jes Sorensen
2007-09-07 16:11 ` [PATCH 1/1] Allow global purge traslation cache (ptc.g) to be disabled Bjorn Helgaas
2007-09-07 16:25 ` Natalie Protasevich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=200709041359.32545.bjorn.helgaas@hp.com \
    --to=bjorn.helgaas@hp.com \
    --cc=linux-ia64@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox