mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2025-01-07 21:53:44 +00:00
cf8e865810
The Itanium architecture is obsolete, and an informal survey [0] reveals that any residual use of Itanium hardware in production is mostly HP-UX or OpenVMS based. The use of Linux on Itanium appears to be limited to enthusiasts that occasionally boot a fresh Linux kernel to see whether things are still working as intended, and perhaps to churn out some distro packages that are rarely used in practice. None of the original companies behind Itanium still produce or support any hardware or software for the architecture, and it is listed as 'Orphaned' in the MAINTAINERS file, as apparently, none of the engineers that contributed on behalf of those companies (nor anyone else, for that matter) have been willing to support or maintain the architecture upstream or even be responsible for applying the odd fix. The Intel firmware team removed all IA-64 support from the Tianocore/EDK2 reference implementation of EFI in 2018. (Itanium is the original architecture for which EFI was developed, and the way Linux supports it deviates significantly from other architectures.) Some distros, such as Debian and Gentoo, still maintain [unofficial] ia64 ports, but many have dropped support years ago. While the argument is being made [1] that there is a 'for the common good' angle to being able to build and run existing projects such as the Grid Community Toolkit [2] on Itanium for interoperability testing, the fact remains that none of those projects are known to be deployed on Linux/ia64, and very few people actually have access to such a system in the first place. Even if there were ways imaginable in which Linux/ia64 could be put to good use today, what matters is whether anyone is actually doing that, and this does not appear to be the case. There are no emulators widely available, and so boot testing Itanium is generally infeasible for ordinary contributors. GCC still supports IA-64 but its compile farm [3] no longer has any IA-64 machines. GLIBC would like to get rid of IA-64 [4] too because it would permit some overdue code cleanups. In summary, the benefits to the ecosystem of having IA-64 be part of it are mostly theoretical, whereas the maintenance overhead of keeping it supported is real. So let's rip off the band aid, and remove the IA-64 arch code entirely. This follows the timeline proposed by the Debian/ia64 maintainer [5], which removes support in a controlled manner, leaving IA-64 in a known good state in the most recent LTS release. Other projects will follow once the kernel support is removed. [0] https://lore.kernel.org/all/CAMj1kXFCMh_578jniKpUtx_j8ByHnt=s7S+yQ+vGbKt9ud7+kQ@mail.gmail.com/ [1] https://lore.kernel.org/all/0075883c-7c51-00f5-2c2d-5119c1820410@web.de/ [2] https://gridcf.org/gct-docs/latest/index.html [3] https://cfarm.tetaneutral.net/machines/list/ [4] https://lore.kernel.org/all/87bkiilpc4.fsf@mid.deneb.enyo.de/ [5] https://lore.kernel.org/all/ff58a3e76e5102c94bb5946d99187b358def688a.camel@physik.fu-berlin.de/ Acked-by: Tony Luck <tony.luck@intel.com> Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
152 lines
3.3 KiB
C
152 lines
3.3 KiB
C
/*
|
|
* This file is subject to the terms and conditions of the GNU General Public
|
|
* License. See the file "COPYING" in the main directory of this archive
|
|
* for more details.
|
|
*
|
|
* (C) Copyright 2020 Hewlett Packard Enterprise Development LP
|
|
* Copyright (c) 2008 Silicon Graphics, Inc. All Rights Reserved.
|
|
*/
|
|
|
|
/*
|
|
* Cross Partition (XP) uv-based functions.
|
|
*
|
|
* Architecture specific implementation of common functions.
|
|
*
|
|
*/
|
|
|
|
#include <linux/device.h>
|
|
#include <asm/uv/uv_hub.h>
|
|
#if defined CONFIG_X86_64
|
|
#include <asm/uv/bios.h>
|
|
#endif
|
|
#include "../sgi-gru/grukservices.h"
|
|
#include "xp.h"
|
|
|
|
/*
|
|
* Convert a virtual memory address to a physical memory address.
|
|
*/
|
|
static unsigned long
|
|
xp_pa_uv(void *addr)
|
|
{
|
|
return uv_gpa(addr);
|
|
}
|
|
|
|
/*
|
|
* Convert a global physical to socket physical address.
|
|
*/
|
|
static unsigned long
|
|
xp_socket_pa_uv(unsigned long gpa)
|
|
{
|
|
return uv_gpa_to_soc_phys_ram(gpa);
|
|
}
|
|
|
|
static enum xp_retval
|
|
xp_remote_mmr_read(unsigned long dst_gpa, const unsigned long src_gpa,
|
|
size_t len)
|
|
{
|
|
int ret;
|
|
unsigned long *dst_va = __va(uv_gpa_to_soc_phys_ram(dst_gpa));
|
|
|
|
BUG_ON(!uv_gpa_in_mmr_space(src_gpa));
|
|
BUG_ON(len != 8);
|
|
|
|
ret = gru_read_gpa(dst_va, src_gpa);
|
|
if (ret == 0)
|
|
return xpSuccess;
|
|
|
|
dev_err(xp, "gru_read_gpa() failed, dst_gpa=0x%016lx src_gpa=0x%016lx "
|
|
"len=%ld\n", dst_gpa, src_gpa, len);
|
|
return xpGruCopyError;
|
|
}
|
|
|
|
|
|
static enum xp_retval
|
|
xp_remote_memcpy_uv(unsigned long dst_gpa, const unsigned long src_gpa,
|
|
size_t len)
|
|
{
|
|
int ret;
|
|
|
|
if (uv_gpa_in_mmr_space(src_gpa))
|
|
return xp_remote_mmr_read(dst_gpa, src_gpa, len);
|
|
|
|
ret = gru_copy_gpa(dst_gpa, src_gpa, len);
|
|
if (ret == 0)
|
|
return xpSuccess;
|
|
|
|
dev_err(xp, "gru_copy_gpa() failed, dst_gpa=0x%016lx src_gpa=0x%016lx "
|
|
"len=%ld\n", dst_gpa, src_gpa, len);
|
|
return xpGruCopyError;
|
|
}
|
|
|
|
static int
|
|
xp_cpu_to_nasid_uv(int cpuid)
|
|
{
|
|
/* ??? Is this same as sn2 nasid in mach/part bitmaps set up by SAL? */
|
|
return UV_PNODE_TO_NASID(uv_cpu_to_pnode(cpuid));
|
|
}
|
|
|
|
static enum xp_retval
|
|
xp_expand_memprotect_uv(unsigned long phys_addr, unsigned long size)
|
|
{
|
|
int ret;
|
|
|
|
#if defined CONFIG_X86_64
|
|
ret = uv_bios_change_memprotect(phys_addr, size, UV_MEMPROT_ALLOW_RW);
|
|
if (ret != BIOS_STATUS_SUCCESS) {
|
|
dev_err(xp, "uv_bios_change_memprotect(,, "
|
|
"UV_MEMPROT_ALLOW_RW) failed, ret=%d\n", ret);
|
|
return xpBiosError;
|
|
}
|
|
#else
|
|
#error not a supported configuration
|
|
#endif
|
|
return xpSuccess;
|
|
}
|
|
|
|
static enum xp_retval
|
|
xp_restrict_memprotect_uv(unsigned long phys_addr, unsigned long size)
|
|
{
|
|
int ret;
|
|
|
|
#if defined CONFIG_X86_64
|
|
ret = uv_bios_change_memprotect(phys_addr, size,
|
|
UV_MEMPROT_RESTRICT_ACCESS);
|
|
if (ret != BIOS_STATUS_SUCCESS) {
|
|
dev_err(xp, "uv_bios_change_memprotect(,, "
|
|
"UV_MEMPROT_RESTRICT_ACCESS) failed, ret=%d\n", ret);
|
|
return xpBiosError;
|
|
}
|
|
#else
|
|
#error not a supported configuration
|
|
#endif
|
|
return xpSuccess;
|
|
}
|
|
|
|
enum xp_retval
|
|
xp_init_uv(void)
|
|
{
|
|
WARN_ON(!is_uv_system());
|
|
if (!is_uv_system())
|
|
return xpUnsupported;
|
|
|
|
xp_max_npartitions = XP_MAX_NPARTITIONS_UV;
|
|
#ifdef CONFIG_X86
|
|
xp_partition_id = sn_partition_id;
|
|
xp_region_size = sn_region_size;
|
|
#endif
|
|
xp_pa = xp_pa_uv;
|
|
xp_socket_pa = xp_socket_pa_uv;
|
|
xp_remote_memcpy = xp_remote_memcpy_uv;
|
|
xp_cpu_to_nasid = xp_cpu_to_nasid_uv;
|
|
xp_expand_memprotect = xp_expand_memprotect_uv;
|
|
xp_restrict_memprotect = xp_restrict_memprotect_uv;
|
|
|
|
return xpSuccess;
|
|
}
|
|
|
|
void
|
|
xp_exit_uv(void)
|
|
{
|
|
WARN_ON(!is_uv_system());
|
|
}
|