treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 156
[linux-2.6-block.git] / drivers / misc / sgi-gru / grufault.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
14258640
JS
2/*
3 * SN Platform GRU Driver
4 *
5 * FAULT HANDLER FOR GRU DETECTED TLB MISSES
6 *
7 * This file contains code that handles TLB misses within the GRU.
8 * These misses are reported either via interrupts or user polling of
9 * the user CB.
10 *
11 * Copyright (c) 2008 Silicon Graphics, Inc. All Rights Reserved.
14258640
JS
12 */
13
14#include <linux/kernel.h>
15#include <linux/errno.h>
16#include <linux/spinlock.h>
17#include <linux/mm.h>
18#include <linux/hugetlb.h>
19#include <linux/device.h>
20#include <linux/io.h>
21#include <linux/uaccess.h>
bb04aa78 22#include <linux/security.h>
268bb0ce 23#include <linux/prefetch.h>
14258640
JS
24#include <asm/pgtable.h>
25#include "gru.h"
26#include "grutables.h"
27#include "grulib.h"
28#include "gru_instructions.h"
29#include <asm/uv/uv_hub.h>
30
9c13cb33
JS
31/* Return codes for vtop functions */
32#define VTOP_SUCCESS 0
33#define VTOP_INVALID -1
34#define VTOP_RETRY -2
35
36
14258640
JS
37/*
38 * Test if a physical address is a valid GRU GSEG address
39 */
40static inline int is_gru_paddr(unsigned long paddr)
41{
42 return paddr >= gru_start_paddr && paddr < gru_end_paddr;
43}
44
45/*
46 * Find the vma of a GRU segment. Caller must hold mmap_sem.
47 */
48struct vm_area_struct *gru_find_vma(unsigned long vaddr)
49{
50 struct vm_area_struct *vma;
51
52 vma = find_vma(current->mm, vaddr);
53 if (vma && vma->vm_start <= vaddr && vma->vm_ops == &gru_vm_ops)
54 return vma;
55 return NULL;
56}
57
58/*
59 * Find and lock the gts that contains the specified user vaddr.
60 *
61 * Returns:
62 * - *gts with the mmap_sem locked for read and the GTS locked.
63 * - NULL if vaddr invalid OR is not a valid GSEG vaddr.
64 */
65
66static struct gru_thread_state *gru_find_lock_gts(unsigned long vaddr)
67{
68 struct mm_struct *mm = current->mm;
69 struct vm_area_struct *vma;
70 struct gru_thread_state *gts = NULL;
71
72 down_read(&mm->mmap_sem);
73 vma = gru_find_vma(vaddr);
74 if (vma)
75 gts = gru_find_thread_state(vma, TSID(vaddr, vma));
76 if (gts)
77 mutex_lock(&gts->ts_ctxlock);
78 else
79 up_read(&mm->mmap_sem);
80 return gts;
81}
82
83static struct gru_thread_state *gru_alloc_locked_gts(unsigned long vaddr)
84{
85 struct mm_struct *mm = current->mm;
86 struct vm_area_struct *vma;
e006043a 87 struct gru_thread_state *gts = ERR_PTR(-EINVAL);
14258640
JS
88
89 down_write(&mm->mmap_sem);
90 vma = gru_find_vma(vaddr);
e006043a
JS
91 if (!vma)
92 goto err;
93
94 gts = gru_alloc_thread_state(vma, TSID(vaddr, vma));
95 if (IS_ERR(gts))
96 goto err;
97 mutex_lock(&gts->ts_ctxlock);
98 downgrade_write(&mm->mmap_sem);
99 return gts;
14258640 100
e006043a
JS
101err:
102 up_write(&mm->mmap_sem);
14258640
JS
103 return gts;
104}
105
106/*
107 * Unlock a GTS that was previously locked with gru_find_lock_gts().
108 */
109static void gru_unlock_gts(struct gru_thread_state *gts)
110{
111 mutex_unlock(&gts->ts_ctxlock);
112 up_read(&current->mm->mmap_sem);
113}
114
115/*
116 * Set a CB.istatus to active using a user virtual address. This must be done
117 * just prior to a TFH RESTART. The new cb.istatus is an in-cache status ONLY.
118 * If the line is evicted, the status may be lost. The in-cache update
119 * is necessary to prevent the user from seeing a stale cb.istatus that will
120 * change as soon as the TFH restart is complete. Races may cause an
121 * occasional failure to clear the cb.istatus, but that is ok.
14258640 122 */
b61fc69b 123static void gru_cb_set_istatus_active(struct gru_instruction_bits *cbk)
14258640 124{
b61fc69b
JS
125 if (cbk) {
126 cbk->istatus = CBS_ACTIVE;
14258640
JS
127 }
128}
129
14258640
JS
130/*
131 * Read & clear a TFM
132 *
133 * The GRU has an array of fault maps. A map is private to a cpu
134 * Only one cpu will be accessing a cpu's fault map.
135 *
136 * This function scans the cpu-private fault map & clears all bits that
137 * are set. The function returns a bitmap that indicates the bits that
138 * were cleared. Note that sense the maps may be updated asynchronously by
139 * the GRU, atomic operations must be used to clear bits.
140 */
141static void get_clear_fault_map(struct gru_state *gru,
4a7a17c1
JS
142 struct gru_tlb_fault_map *imap,
143 struct gru_tlb_fault_map *dmap)
14258640
JS
144{
145 unsigned long i, k;
146 struct gru_tlb_fault_map *tfm;
147
148 tfm = get_tfm_for_cpu(gru, gru_cpu_fault_map_id());
149 prefetchw(tfm); /* Helps on hardware, required for emulator */
150 for (i = 0; i < BITS_TO_LONGS(GRU_NUM_CBE); i++) {
151 k = tfm->fault_bits[i];
152 if (k)
153 k = xchg(&tfm->fault_bits[i], 0UL);
4a7a17c1
JS
154 imap->fault_bits[i] = k;
155 k = tfm->done_bits[i];
156 if (k)
157 k = xchg(&tfm->done_bits[i], 0UL);
158 dmap->fault_bits[i] = k;
14258640
JS
159 }
160
161 /*
162 * Not functionally required but helps performance. (Required
163 * on emulator)
164 */
165 gru_flush_cache(tfm);
166}
167
168/*
169 * Atomic (interrupt context) & non-atomic (user context) functions to
170 * convert a vaddr into a physical address. The size of the page
171 * is returned in pageshift.
172 * returns:
173 * 0 - successful
174 * < 0 - error code
175 * 1 - (atomic only) try again in non-atomic context
176 */
177static int non_atomic_pte_lookup(struct vm_area_struct *vma,
178 unsigned long vaddr, int write,
179 unsigned long *paddr, int *pageshift)
180{
181 struct page *page;
182
74ccd095
JS
183#ifdef CONFIG_HUGETLB_PAGE
184 *pageshift = is_vm_hugetlb_page(vma) ? HPAGE_SHIFT : PAGE_SHIFT;
185#else
14258640 186 *pageshift = PAGE_SHIFT;
74ccd095 187#endif
768ae309 188 if (get_user_pages(vaddr, 1, write ? FOLL_WRITE : 0, &page, NULL) <= 0)
14258640
JS
189 return -EFAULT;
190 *paddr = page_to_phys(page);
191 put_page(page);
192 return 0;
193}
194
195/*
14258640
JS
196 * atomic_pte_lookup
197 *
198 * Convert a user virtual address to a physical address
199 * Only supports Intel large pages (2MB only) on x86_64.
200 * ZZZ - hugepage support is incomplete
923f7f69
JS
201 *
202 * NOTE: mmap_sem is already held on entry to this function. This
203 * guarantees existence of the page tables.
14258640
JS
204 */
205static int atomic_pte_lookup(struct vm_area_struct *vma, unsigned long vaddr,
206 int write, unsigned long *paddr, int *pageshift)
207{
208 pgd_t *pgdp;
c2febafc 209 p4d_t *p4dp;
14258640 210 pud_t *pudp;
c2febafc 211 pmd_t *pmdp;
14258640
JS
212 pte_t pte;
213
14258640
JS
214 pgdp = pgd_offset(vma->vm_mm, vaddr);
215 if (unlikely(pgd_none(*pgdp)))
216 goto err;
217
c2febafc
KS
218 p4dp = p4d_offset(pgdp, vaddr);
219 if (unlikely(p4d_none(*p4dp)))
220 goto err;
221
222 pudp = pud_offset(p4dp, vaddr);
14258640
JS
223 if (unlikely(pud_none(*pudp)))
224 goto err;
225
226 pmdp = pmd_offset(pudp, vaddr);
227 if (unlikely(pmd_none(*pmdp)))
228 goto err;
229#ifdef CONFIG_X86_64
230 if (unlikely(pmd_large(*pmdp)))
231 pte = *(pte_t *) pmdp;
232 else
233#endif
234 pte = *pte_offset_kernel(pmdp, vaddr);
235
14258640
JS
236 if (unlikely(!pte_present(pte) ||
237 (write && (!pte_write(pte) || !pte_dirty(pte)))))
238 return 1;
239
240 *paddr = pte_pfn(pte) << PAGE_SHIFT;
023a407f 241#ifdef CONFIG_HUGETLB_PAGE
14258640 242 *pageshift = is_vm_hugetlb_page(vma) ? HPAGE_SHIFT : PAGE_SHIFT;
023a407f
JS
243#else
244 *pageshift = PAGE_SHIFT;
245#endif
14258640
JS
246 return 0;
247
248err:
14258640
JS
249 return 1;
250}
251
ecdaf2b5
JS
252static int gru_vtop(struct gru_thread_state *gts, unsigned long vaddr,
253 int write, int atomic, unsigned long *gpa, int *pageshift)
254{
255 struct mm_struct *mm = gts->ts_mm;
256 struct vm_area_struct *vma;
257 unsigned long paddr;
258 int ret, ps;
259
260 vma = find_vma(mm, vaddr);
261 if (!vma)
262 goto inval;
263
264 /*
265 * Atomic lookup is faster & usually works even if called in non-atomic
266 * context.
267 */
268 rmb(); /* Must/check ms_range_active before loading PTEs */
269 ret = atomic_pte_lookup(vma, vaddr, write, &paddr, &ps);
270 if (ret) {
271 if (atomic)
272 goto upm;
273 if (non_atomic_pte_lookup(vma, vaddr, write, &paddr, &ps))
274 goto inval;
275 }
276 if (is_gru_paddr(paddr))
277 goto inval;
278 paddr = paddr & ~((1UL << ps) - 1);
279 *gpa = uv_soc_phys_ram_to_gpa(paddr);
280 *pageshift = ps;
9c13cb33 281 return VTOP_SUCCESS;
ecdaf2b5
JS
282
283inval:
9c13cb33 284 return VTOP_INVALID;
ecdaf2b5 285upm:
9c13cb33 286 return VTOP_RETRY;
ecdaf2b5
JS
287}
288
289
c550222f
JS
290/*
291 * Flush a CBE from cache. The CBE is clean in the cache. Dirty the
292 * CBE cacheline so that the line will be written back to home agent.
293 * Otherwise the line may be silently dropped. This has no impact
294 * except on performance.
295 */
296static void gru_flush_cache_cbe(struct gru_control_block_extended *cbe)
297{
298 if (unlikely(cbe)) {
299 cbe->cbrexecstatus = 0; /* make CL dirty */
300 gru_flush_cache(cbe);
301 }
302}
303
304/*
305 * Preload the TLB with entries that may be required. Currently, preloading
306 * is implemented only for BCOPY. Preload <tlb_preload_count> pages OR to
307 * the end of the bcopy tranfer, whichever is smaller.
308 */
309static void gru_preload_tlb(struct gru_state *gru,
310 struct gru_thread_state *gts, int atomic,
311 unsigned long fault_vaddr, int asid, int write,
312 unsigned char tlb_preload_count,
313 struct gru_tlb_fault_handle *tfh,
314 struct gru_control_block_extended *cbe)
315{
316 unsigned long vaddr = 0, gpa;
317 int ret, pageshift;
318
319 if (cbe->opccpy != OP_BCOPY)
320 return;
321
322 if (fault_vaddr == cbe->cbe_baddr0)
323 vaddr = fault_vaddr + GRU_CACHE_LINE_BYTES * cbe->cbe_src_cl - 1;
324 else if (fault_vaddr == cbe->cbe_baddr1)
325 vaddr = fault_vaddr + (1 << cbe->xtypecpy) * cbe->cbe_nelemcur - 1;
326
327 fault_vaddr &= PAGE_MASK;
328 vaddr &= PAGE_MASK;
329 vaddr = min(vaddr, fault_vaddr + tlb_preload_count * PAGE_SIZE);
330
331 while (vaddr > fault_vaddr) {
332 ret = gru_vtop(gts, vaddr, write, atomic, &gpa, &pageshift);
333 if (ret || tfh_write_only(tfh, gpa, GAA_RAM, vaddr, asid, write,
334 GRU_PAGESIZE(pageshift)))
335 return;
336 gru_dbg(grudev,
337 "%s: gid %d, gts 0x%p, tfh 0x%p, vaddr 0x%lx, asid 0x%x, rw %d, ps %d, gpa 0x%lx\n",
338 atomic ? "atomic" : "non-atomic", gru->gs_gid, gts, tfh,
339 vaddr, asid, write, pageshift, gpa);
340 vaddr -= PAGE_SIZE;
341 STAT(tlb_preload_page);
342 }
343}
344
14258640
JS
345/*
346 * Drop a TLB entry into the GRU. The fault is described by info in an TFH.
347 * Input:
348 * cb Address of user CBR. Null if not running in user context
349 * Return:
350 * 0 = dropin, exception, or switch to UPM successful
351 * 1 = range invalidate active
352 * < 0 = error code
353 *
354 */
2ce4d4c9
JS
355static int gru_try_dropin(struct gru_state *gru,
356 struct gru_thread_state *gts,
14258640 357 struct gru_tlb_fault_handle *tfh,
b61fc69b 358 struct gru_instruction_bits *cbk)
14258640 359{
c550222f
JS
360 struct gru_control_block_extended *cbe = NULL;
361 unsigned char tlb_preload_count = gts->ts_tlb_preload_count;
563447d7 362 int pageshift = 0, asid, write, ret, atomic = !cbk, indexway;
ecdaf2b5 363 unsigned long gpa = 0, vaddr = 0;
14258640
JS
364
365 /*
366 * NOTE: The GRU contains magic hardware that eliminates races between
367 * TLB invalidates and TLB dropins. If an invalidate occurs
368 * in the window between reading the TFH and the subsequent TLB dropin,
369 * the dropin is ignored. This eliminates the need for additional locks.
370 */
371
c550222f
JS
372 /*
373 * Prefetch the CBE if doing TLB preloading
374 */
375 if (unlikely(tlb_preload_count)) {
376 cbe = gru_tfh_to_cbe(tfh);
377 prefetchw(cbe);
378 }
379
14258640
JS
380 /*
381 * Error if TFH state is IDLE or FMM mode & the user issuing a UPM call.
382 * Might be a hardware race OR a stupid user. Ignore FMM because FMM
383 * is a transient state.
384 */
270952a9
JS
385 if (tfh->status != TFHSTATUS_EXCEPTION) {
386 gru_flush_cache(tfh);
67bf04a5 387 sync_core();
270952a9
JS
388 if (tfh->status != TFHSTATUS_EXCEPTION)
389 goto failnoexception;
390 STAT(tfh_stale_on_fault);
391 }
14258640
JS
392 if (tfh->state == TFHSTATE_IDLE)
393 goto failidle;
b61fc69b 394 if (tfh->state == TFHSTATE_MISS_FMM && cbk)
14258640
JS
395 goto failfmm;
396
397 write = (tfh->cause & TFHCAUSE_TLB_MOD) != 0;
398 vaddr = tfh->missvaddr;
399 asid = tfh->missasid;
563447d7 400 indexway = tfh->indexway;
14258640
JS
401 if (asid == 0)
402 goto failnoasid;
403
404 rmb(); /* TFH must be cache resident before reading ms_range_active */
405
406 /*
407 * TFH is cache resident - at least briefly. Fail the dropin
408 * if a range invalidate is active.
409 */
410 if (atomic_read(&gts->ts_gms->ms_range_active))
411 goto failactive;
412
ecdaf2b5 413 ret = gru_vtop(gts, vaddr, write, atomic, &gpa, &pageshift);
9c13cb33 414 if (ret == VTOP_INVALID)
14258640 415 goto failinval;
9c13cb33 416 if (ret == VTOP_RETRY)
ecdaf2b5 417 goto failupm;
14258640 418
7b8274e9
JS
419 if (!(gts->ts_sizeavail & GRU_SIZEAVAIL(pageshift))) {
420 gts->ts_sizeavail |= GRU_SIZEAVAIL(pageshift);
99f7c229 421 if (atomic || !gru_update_cch(gts)) {
7b8274e9
JS
422 gts->ts_force_cch_reload = 1;
423 goto failupm;
424 }
425 }
c550222f
JS
426
427 if (unlikely(cbe) && pageshift == PAGE_SHIFT) {
2ce4d4c9 428 gru_preload_tlb(gru, gts, atomic, vaddr, asid, write, tlb_preload_count, tfh, cbe);
c550222f
JS
429 gru_flush_cache_cbe(cbe);
430 }
431
b61fc69b 432 gru_cb_set_istatus_active(cbk);
5958ab88 433 gts->ustats.tlbdropin++;
14258640
JS
434 tfh_write_restart(tfh, gpa, GAA_RAM, vaddr, asid, write,
435 GRU_PAGESIZE(pageshift));
14258640 436 gru_dbg(grudev,
563447d7
JS
437 "%s: gid %d, gts 0x%p, tfh 0x%p, vaddr 0x%lx, asid 0x%x, indexway 0x%x,"
438 " rw %d, ps %d, gpa 0x%lx\n",
2ce4d4c9 439 atomic ? "atomic" : "non-atomic", gru->gs_gid, gts, tfh, vaddr, asid,
563447d7
JS
440 indexway, write, pageshift, gpa);
441 STAT(tlb_dropin);
14258640
JS
442 return 0;
443
444failnoasid:
445 /* No asid (delayed unload). */
446 STAT(tlb_dropin_fail_no_asid);
447 gru_dbg(grudev, "FAILED no_asid tfh: 0x%p, vaddr 0x%lx\n", tfh, vaddr);
b61fc69b 448 if (!cbk)
14258640
JS
449 tfh_user_polling_mode(tfh);
450 else
451 gru_flush_cache(tfh);
c550222f 452 gru_flush_cache_cbe(cbe);
14258640
JS
453 return -EAGAIN;
454
455failupm:
456 /* Atomic failure switch CBR to UPM */
457 tfh_user_polling_mode(tfh);
c550222f 458 gru_flush_cache_cbe(cbe);
14258640
JS
459 STAT(tlb_dropin_fail_upm);
460 gru_dbg(grudev, "FAILED upm tfh: 0x%p, vaddr 0x%lx\n", tfh, vaddr);
461 return 1;
462
463failfmm:
464 /* FMM state on UPM call */
fe5bb6b0 465 gru_flush_cache(tfh);
c550222f 466 gru_flush_cache_cbe(cbe);
14258640
JS
467 STAT(tlb_dropin_fail_fmm);
468 gru_dbg(grudev, "FAILED fmm tfh: 0x%p, state %d\n", tfh, tfh->state);
469 return 0;
470
cd1334f0
JS
471failnoexception:
472 /* TFH status did not show exception pending */
473 gru_flush_cache(tfh);
c550222f 474 gru_flush_cache_cbe(cbe);
b61fc69b
JS
475 if (cbk)
476 gru_flush_cache(cbk);
cd1334f0 477 STAT(tlb_dropin_fail_no_exception);
b61fc69b
JS
478 gru_dbg(grudev, "FAILED non-exception tfh: 0x%p, status %d, state %d\n",
479 tfh, tfh->status, tfh->state);
cd1334f0
JS
480 return 0;
481
14258640 482failidle:
cd1334f0 483 /* TFH state was idle - no miss pending */
14258640 484 gru_flush_cache(tfh);
c550222f 485 gru_flush_cache_cbe(cbe);
b61fc69b
JS
486 if (cbk)
487 gru_flush_cache(cbk);
14258640
JS
488 STAT(tlb_dropin_fail_idle);
489 gru_dbg(grudev, "FAILED idle tfh: 0x%p, state %d\n", tfh, tfh->state);
490 return 0;
491
492failinval:
493 /* All errors (atomic & non-atomic) switch CBR to EXCEPTION state */
494 tfh_exception(tfh);
c550222f 495 gru_flush_cache_cbe(cbe);
14258640
JS
496 STAT(tlb_dropin_fail_invalid);
497 gru_dbg(grudev, "FAILED inval tfh: 0x%p, vaddr 0x%lx\n", tfh, vaddr);
498 return -EFAULT;
499
500failactive:
501 /* Range invalidate active. Switch to UPM iff atomic */
b61fc69b 502 if (!cbk)
14258640
JS
503 tfh_user_polling_mode(tfh);
504 else
505 gru_flush_cache(tfh);
c550222f 506 gru_flush_cache_cbe(cbe);
14258640
JS
507 STAT(tlb_dropin_fail_range_active);
508 gru_dbg(grudev, "FAILED range active: tfh 0x%p, vaddr 0x%lx\n",
509 tfh, vaddr);
510 return 1;
511}
512
513/*
514 * Process an external interrupt from the GRU. This interrupt is
515 * caused by a TLB miss.
516 * Note that this is the interrupt handler that is registered with linux
517 * interrupt handlers.
518 */
4107e1d3 519static irqreturn_t gru_intr(int chiplet, int blade)
14258640
JS
520{
521 struct gru_state *gru;
4a7a17c1 522 struct gru_tlb_fault_map imap, dmap;
14258640
JS
523 struct gru_thread_state *gts;
524 struct gru_tlb_fault_handle *tfh = NULL;
2ce4d4c9 525 struct completion *cmp;
14258640
JS
526 int cbrnum, ctxnum;
527
528 STAT(intr);
529
4107e1d3 530 gru = &gru_base[blade]->bs_grus[chiplet];
14258640 531 if (!gru) {
4107e1d3
JS
532 dev_err(grudev, "GRU: invalid interrupt: cpu %d, chiplet %d\n",
533 raw_smp_processor_id(), chiplet);
14258640
JS
534 return IRQ_NONE;
535 }
4a7a17c1 536 get_clear_fault_map(gru, &imap, &dmap);
4107e1d3
JS
537 gru_dbg(grudev,
538 "cpu %d, chiplet %d, gid %d, imap %016lx %016lx, dmap %016lx %016lx\n",
539 smp_processor_id(), chiplet, gru->gs_gid,
540 imap.fault_bits[0], imap.fault_bits[1],
541 dmap.fault_bits[0], dmap.fault_bits[1]);
4a7a17c1
JS
542
543 for_each_cbr_in_tfm(cbrnum, dmap.fault_bits) {
563447d7 544 STAT(intr_cbr);
2ce4d4c9
JS
545 cmp = gru->gs_blade->bs_async_wq;
546 if (cmp)
547 complete(cmp);
4a7a17c1 548 gru_dbg(grudev, "gid %d, cbr_done %d, done %d\n",
2ce4d4c9 549 gru->gs_gid, cbrnum, cmp ? cmp->done : -1);
4a7a17c1 550 }
14258640 551
4a7a17c1 552 for_each_cbr_in_tfm(cbrnum, imap.fault_bits) {
563447d7 553 STAT(intr_tfh);
14258640
JS
554 tfh = get_tfh_by_index(gru, cbrnum);
555 prefetchw(tfh); /* Helps on hdw, required for emulator */
556
557 /*
558 * When hardware sets a bit in the faultmap, it implicitly
559 * locks the GRU context so that it cannot be unloaded.
560 * The gts cannot change until a TFH start/writestart command
561 * is issued.
562 */
563 ctxnum = tfh->ctxnum;
564 gts = gru->gs_gts[ctxnum];
565
2ce4d4c9
JS
566 /* Spurious interrupts can cause this. Ignore. */
567 if (!gts) {
568 STAT(intr_spurious);
569 continue;
570 }
571
14258640
JS
572 /*
573 * This is running in interrupt context. Trylock the mmap_sem.
574 * If it fails, retry the fault in user context.
575 */
5958ab88 576 gts->ustats.fmm_tlbmiss++;
cd1334f0
JS
577 if (!gts->ts_force_cch_reload &&
578 down_read_trylock(&gts->ts_mm->mmap_sem)) {
2ce4d4c9 579 gru_try_dropin(gru, gts, tfh, NULL);
14258640
JS
580 up_read(&gts->ts_mm->mmap_sem);
581 } else {
582 tfh_user_polling_mode(tfh);
43884604 583 STAT(intr_mm_lock_failed);
14258640
JS
584 }
585 }
586 return IRQ_HANDLED;
587}
588
4107e1d3
JS
589irqreturn_t gru0_intr(int irq, void *dev_id)
590{
591 return gru_intr(0, uv_numa_blade_id());
592}
593
594irqreturn_t gru1_intr(int irq, void *dev_id)
595{
596 return gru_intr(1, uv_numa_blade_id());
597}
598
599irqreturn_t gru_intr_mblade(int irq, void *dev_id)
600{
601 int blade;
602
603 for_each_possible_blade(blade) {
604 if (uv_blade_nr_possible_cpus(blade))
605 continue;
bffcd112
PH
606 gru_intr(0, blade);
607 gru_intr(1, blade);
4107e1d3
JS
608 }
609 return IRQ_HANDLED;
610}
611
14258640
JS
612
613static int gru_user_dropin(struct gru_thread_state *gts,
614 struct gru_tlb_fault_handle *tfh,
b61fc69b 615 void *cb)
14258640
JS
616{
617 struct gru_mm_struct *gms = gts->ts_gms;
618 int ret;
619
5958ab88 620 gts->ustats.upm_tlbmiss++;
14258640
JS
621 while (1) {
622 wait_event(gms->ms_wait_queue,
623 atomic_read(&gms->ms_range_active) == 0);
624 prefetchw(tfh); /* Helps on hdw, required for emulator */
2ce4d4c9 625 ret = gru_try_dropin(gts->ts_gru, gts, tfh, cb);
14258640
JS
626 if (ret <= 0)
627 return ret;
628 STAT(call_os_wait_queue);
629 }
630}
631
632/*
633 * This interface is called as a result of a user detecting a "call OS" bit
634 * in a user CB. Normally means that a TLB fault has occurred.
635 * cb - user virtual address of the CB
636 */
637int gru_handle_user_call_os(unsigned long cb)
638{
639 struct gru_tlb_fault_handle *tfh;
640 struct gru_thread_state *gts;
b61fc69b 641 void *cbk;
14258640
JS
642 int ucbnum, cbrnum, ret = -EINVAL;
643
644 STAT(call_os);
14258640
JS
645
646 /* sanity check the cb pointer */
647 ucbnum = get_cb_number((void *)cb);
648 if ((cb & (GRU_HANDLE_STRIDE - 1)) || ucbnum >= GRU_NUM_CB)
649 return -EINVAL;
14258640
JS
650
651 gts = gru_find_lock_gts(cb);
652 if (!gts)
653 return -EINVAL;
563447d7 654 gru_dbg(grudev, "address 0x%lx, gid %d, gts 0x%p\n", cb, gts->ts_gru ? gts->ts_gru->gs_gid : -1, gts);
14258640 655
fe5bb6b0 656 if (ucbnum >= gts->ts_cbr_au_count * GRU_CBR_AU_SIZE)
14258640 657 goto exit;
14258640 658
55484c45 659 gru_check_context_placement(gts);
fe5bb6b0 660
7b8274e9
JS
661 /*
662 * CCH may contain stale data if ts_force_cch_reload is set.
663 */
664 if (gts->ts_gru && gts->ts_force_cch_reload) {
7b8274e9 665 gts->ts_force_cch_reload = 0;
99f7c229 666 gru_update_cch(gts);
7b8274e9
JS
667 }
668
14258640
JS
669 ret = -EAGAIN;
670 cbrnum = thread_cbr_number(gts, ucbnum);
99f7c229 671 if (gts->ts_gru) {
14258640 672 tfh = get_tfh_by_index(gts->ts_gru, cbrnum);
b61fc69b
JS
673 cbk = get_gseg_base_address_cb(gts->ts_gru->gs_gru_base_vaddr,
674 gts->ts_ctxnum, ucbnum);
675 ret = gru_user_dropin(gts, tfh, cbk);
14258640
JS
676 }
677exit:
678 gru_unlock_gts(gts);
679 return ret;
680}
681
682/*
683 * Fetch the exception detail information for a CB that terminated with
684 * an exception.
685 */
686int gru_get_exception_detail(unsigned long arg)
687{
688 struct control_block_extended_exc_detail excdet;
689 struct gru_control_block_extended *cbe;
690 struct gru_thread_state *gts;
691 int ucbnum, cbrnum, ret;
692
693 STAT(user_exception);
694 if (copy_from_user(&excdet, (void __user *)arg, sizeof(excdet)))
695 return -EFAULT;
696
14258640
JS
697 gts = gru_find_lock_gts(excdet.cb);
698 if (!gts)
699 return -EINVAL;
700
563447d7 701 gru_dbg(grudev, "address 0x%lx, gid %d, gts 0x%p\n", excdet.cb, gts->ts_gru ? gts->ts_gru->gs_gid : -1, gts);
fe5bb6b0
JS
702 ucbnum = get_cb_number((void *)excdet.cb);
703 if (ucbnum >= gts->ts_cbr_au_count * GRU_CBR_AU_SIZE) {
704 ret = -EINVAL;
705 } else if (gts->ts_gru) {
14258640
JS
706 cbrnum = thread_cbr_number(gts, ucbnum);
707 cbe = get_cbe_by_index(gts->ts_gru, cbrnum);
1a2c09e3 708 gru_flush_cache(cbe); /* CBE not coherent */
67bf04a5 709 sync_core(); /* make sure we are have current data */
14258640
JS
710 excdet.opc = cbe->opccpy;
711 excdet.exopc = cbe->exopccpy;
712 excdet.ecause = cbe->ecause;
713 excdet.exceptdet0 = cbe->idef1upd;
714 excdet.exceptdet1 = cbe->idef3upd;
cd1334f0
JS
715 excdet.cbrstate = cbe->cbrstate;
716 excdet.cbrexecstatus = cbe->cbrexecstatus;
c550222f 717 gru_flush_cache_cbe(cbe);
14258640
JS
718 ret = 0;
719 } else {
720 ret = -EAGAIN;
721 }
722 gru_unlock_gts(gts);
723
cd1334f0
JS
724 gru_dbg(grudev,
725 "cb 0x%lx, op %d, exopc %d, cbrstate %d, cbrexecstatus 0x%x, ecause 0x%x, "
726 "exdet0 0x%lx, exdet1 0x%x\n",
727 excdet.cb, excdet.opc, excdet.exopc, excdet.cbrstate, excdet.cbrexecstatus,
728 excdet.ecause, excdet.exceptdet0, excdet.exceptdet1);
14258640
JS
729 if (!ret && copy_to_user((void __user *)arg, &excdet, sizeof(excdet)))
730 ret = -EFAULT;
731 return ret;
732}
733
734/*
735 * User request to unload a context. Content is saved for possible reload.
736 */
bb04aa78
JS
737static int gru_unload_all_contexts(void)
738{
739 struct gru_thread_state *gts;
740 struct gru_state *gru;
e1c3219d 741 int gid, ctxnum;
bb04aa78
JS
742
743 if (!capable(CAP_SYS_ADMIN))
744 return -EPERM;
e1c3219d 745 foreach_gid(gid) {
bb04aa78
JS
746 gru = GID_TO_GRU(gid);
747 spin_lock(&gru->gs_lock);
748 for (ctxnum = 0; ctxnum < GRU_NUM_CCH; ctxnum++) {
749 gts = gru->gs_gts[ctxnum];
750 if (gts && mutex_trylock(&gts->ts_ctxlock)) {
751 spin_unlock(&gru->gs_lock);
752 gru_unload_context(gts, 1);
d57c82b1 753 mutex_unlock(&gts->ts_ctxlock);
bb04aa78
JS
754 spin_lock(&gru->gs_lock);
755 }
756 }
757 spin_unlock(&gru->gs_lock);
758 }
759 return 0;
760}
761
14258640
JS
762int gru_user_unload_context(unsigned long arg)
763{
764 struct gru_thread_state *gts;
765 struct gru_unload_context_req req;
766
767 STAT(user_unload_context);
768 if (copy_from_user(&req, (void __user *)arg, sizeof(req)))
769 return -EFAULT;
770
771 gru_dbg(grudev, "gseg 0x%lx\n", req.gseg);
772
bb04aa78
JS
773 if (!req.gseg)
774 return gru_unload_all_contexts();
775
14258640
JS
776 gts = gru_find_lock_gts(req.gseg);
777 if (!gts)
778 return -EINVAL;
779
780 if (gts->ts_gru)
781 gru_unload_context(gts, 1);
782 gru_unlock_gts(gts);
783
784 return 0;
785}
786
787/*
788 * User request to flush a range of virtual addresses from the GRU TLB
789 * (Mainly for testing).
790 */
791int gru_user_flush_tlb(unsigned long arg)
792{
793 struct gru_thread_state *gts;
794 struct gru_flush_tlb_req req;
1926ee85 795 struct gru_mm_struct *gms;
14258640
JS
796
797 STAT(user_flush_tlb);
798 if (copy_from_user(&req, (void __user *)arg, sizeof(req)))
799 return -EFAULT;
800
801 gru_dbg(grudev, "gseg 0x%lx, vaddr 0x%lx, len 0x%lx\n", req.gseg,
802 req.vaddr, req.len);
803
804 gts = gru_find_lock_gts(req.gseg);
805 if (!gts)
806 return -EINVAL;
807
1926ee85 808 gms = gts->ts_gms;
14258640 809 gru_unlock_gts(gts);
1926ee85 810 gru_flush_tlb_range(gms, req.vaddr, req.len);
14258640
JS
811
812 return 0;
813}
814
7e796a72
JS
815/*
816 * Fetch GSEG statisticss
817 */
818long gru_get_gseg_statistics(unsigned long arg)
819{
820 struct gru_thread_state *gts;
821 struct gru_get_gseg_statistics_req req;
822
823 if (copy_from_user(&req, (void __user *)arg, sizeof(req)))
824 return -EFAULT;
825
091f1a10
JS
826 /*
827 * The library creates arrays of contexts for threaded programs.
828 * If no gts exists in the array, the context has never been used & all
829 * statistics are implicitly 0.
830 */
7e796a72
JS
831 gts = gru_find_lock_gts(req.gseg);
832 if (gts) {
833 memcpy(&req.stats, &gts->ustats, sizeof(gts->ustats));
834 gru_unlock_gts(gts);
835 } else {
836 memset(&req.stats, 0, sizeof(gts->ustats));
837 }
838
839 if (copy_to_user((void __user *)arg, &req, sizeof(req)))
840 return -EFAULT;
841
842 return 0;
843}
844
14258640
JS
845/*
846 * Register the current task as the user of the GSEG slice.
847 * Needed for TLB fault interrupt targeting.
848 */
92b39388 849int gru_set_context_option(unsigned long arg)
14258640
JS
850{
851 struct gru_thread_state *gts;
92b39388
JS
852 struct gru_set_context_option_req req;
853 int ret = 0;
14258640 854
92b39388
JS
855 STAT(set_context_option);
856 if (copy_from_user(&req, (void __user *)arg, sizeof(req)))
857 return -EFAULT;
858 gru_dbg(grudev, "op %d, gseg 0x%lx, value1 0x%lx\n", req.op, req.gseg, req.val1);
859
c550222f
JS
860 gts = gru_find_lock_gts(req.gseg);
861 if (!gts) {
862 gts = gru_alloc_locked_gts(req.gseg);
863 if (IS_ERR(gts))
864 return PTR_ERR(gts);
865 }
14258640 866
92b39388 867 switch (req.op) {
518e5cd4
JS
868 case sco_blade_chiplet:
869 /* Select blade/chiplet for GRU context */
a7d0dabb
DS
870 if (req.val0 < -1 || req.val0 >= GRU_CHIPLETS_PER_HUB ||
871 req.val1 < -1 || req.val1 >= GRU_MAX_BLADES ||
872 (req.val1 >= 0 && !gru_base[req.val1])) {
518e5cd4
JS
873 ret = -EINVAL;
874 } else {
875 gts->ts_user_blade_id = req.val1;
876 gts->ts_user_chiplet_id = req.val0;
55484c45 877 gru_check_context_placement(gts);
518e5cd4
JS
878 }
879 break;
92b39388
JS
880 case sco_gseg_owner:
881 /* Register the current task as the GSEG owner */
882 gts->ts_tgid_owner = current->tgid;
883 break;
b1b19fcf
JS
884 case sco_cch_req_slice:
885 /* Set the CCH slice option */
886 gts->ts_cch_req_slice = req.val1 & 3;
887 break;
92b39388
JS
888 default:
889 ret = -EINVAL;
890 }
14258640
JS
891 gru_unlock_gts(gts);
892
92b39388 893 return ret;
14258640 894}