]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
authorJames Morse <james.morse@arm.com>
Thu, 15 May 2025 16:58:46 +0000 (16:58 +0000)
committerBorislav Petkov (AMD) <bp@alien8.de>
Fri, 16 May 2025 09:35:23 +0000 (11:35 +0200)
Once the filesystem parts of resctrl move to fs/resctrl, it cannot rely
on definitions in x86's internal.h.

Move definitions in internal.h that need to be shared between the
filesystem and architecture code to header files that fs/resctrl can
include.

Doing this separately means the filesystem code only moves between files
of the same name, instead of having these changes mixed in too.

Co-developed-by: Dave Martin <Dave.Martin@arm.com>
Signed-off-by: Dave Martin <Dave.Martin@arm.com>
Signed-off-by: James Morse <james.morse@arm.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Shaopeng Tan <tan.shaopeng@jp.fujitsu.com>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Reviewed-by: Fenghua Yu <fenghuay@nvidia.com>
Reviewed-by: Reinette Chatre <reinette.chatre@intel.com>
Tested-by: Fenghua Yu <fenghuay@nvidia.com>
Tested-by: Carl Worth <carl@os.amperecomputing.com> # arm64
Tested-by: Shaopeng Tan <tan.shaopeng@jp.fujitsu.com>
Tested-by: Peter Newman <peternewman@google.com>
Tested-by: Amit Singh Tomar <amitsinght@marvell.com> # arm64
Tested-by: Shanker Donthineni <sdonthineni@nvidia.com> # arm64
Tested-by: Babu Moger <babu.moger@amd.com>
Tested-by: Tony Luck <tony.luck@intel.com>
Link: https://lore.kernel.org/20250515165855.31452-17-james.morse@arm.com
arch/x86/kernel/cpu/resctrl/internal.h
arch/x86/kernel/cpu/resctrl/rdtgroup.c
include/linux/resctrl.h
include/linux/resctrl_types.h

index 348895d3b4b8b9e5452a44e7368efe0df6b599b8..dc63ac538a81693dfa9fc0141cec95aeff28973e 100644 (file)
@@ -16,8 +16,6 @@
 #define CQM_LIMBOCHECK_INTERVAL        1000
 
 #define MBM_CNTR_WIDTH_BASE            24
-#define MBM_OVERFLOW_INTERVAL          1000
-#define MAX_MBA_BW                     100u
 #define MBA_IS_LINEAR                  0x4
 #define MBM_CNTR_WIDTH_OFFSET_AMD      20
 
@@ -396,13 +394,6 @@ extern struct rdtgroup rdtgroup_default;
 extern struct dentry *debugfs_resctrl;
 extern enum resctrl_event_id mba_mbps_default_event;
 
-static inline bool resctrl_arch_get_cdp_enabled(enum resctrl_res_level l)
-{
-       return rdt_resources_all[l].cdp_enabled;
-}
-
-int resctrl_arch_set_cdp_enabled(enum resctrl_res_level l, bool enable);
-
 void arch_mon_domain_online(struct rdt_resource *r, struct rdt_mon_domain *d);
 
 /* CPUID.(EAX=10H, ECX=ResID=1).EAX */
index 3a4a0bb70f6a5e3e2ad3ac0250feb340513e35be..ac4baf1722694b6176dde75702d05618cf39bd79 100644 (file)
@@ -2541,6 +2541,11 @@ int resctrl_arch_set_cdp_enabled(enum resctrl_res_level l, bool enable)
        return 0;
 }
 
+bool resctrl_arch_get_cdp_enabled(enum resctrl_res_level l)
+{
+       return rdt_resources_all[l].cdp_enabled;
+}
+
 /*
  * We don't allow rdtgroup directories to be created anywhere
  * except the root directory. Thus when looking for the rdtgroup
index 5c7c8bf2c47f9e11047a6a553043d25a29d8c64f..b9d1f2916e9cc2221efed9ca1d6531fc3af05789 100644 (file)
@@ -403,6 +403,9 @@ static inline u32 resctrl_get_config_index(u32 closid,
        }
 }
 
+bool resctrl_arch_get_cdp_enabled(enum resctrl_res_level l);
+int resctrl_arch_set_cdp_enabled(enum resctrl_res_level l, bool enable);
+
 /*
  * Update the ctrl_val and apply this config right now.
  * Must be called on one of the domain's CPUs.
index 69bf740130ac6c15285518666e9bb6a514a53828..a66e7936943e9360f75f4438b0a0846eafeb5bb9 100644 (file)
@@ -7,6 +7,9 @@
 #ifndef __LINUX_RESCTRL_TYPES_H
 #define __LINUX_RESCTRL_TYPES_H
 
+#define MAX_MBA_BW                     100u
+#define MBM_OVERFLOW_INTERVAL          1000
+
 /* Reads to Local DRAM Memory */
 #define READS_TO_LOCAL_MEM             BIT(0)