Received: by 10.223.185.116 with SMTP id b49csp4261956wrg; Mon, 19 Feb 2018 14:24:56 -0800 (PST) X-Google-Smtp-Source: AH8x225yqAl89u8ez4ct95NrEXt5P5JMvtx6Tj23Yraf6KciYa06HTzCZLZdB2mXE42Kj4+N1dVO X-Received: by 10.101.93.17 with SMTP id e17mr8205626pgr.281.1519079096094; Mon, 19 Feb 2018 14:24:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519079096; cv=none; d=google.com; s=arc-20160816; b=BmlK16nGstIyNpuZ76x6466LrXmhRw4BnRybGBP1ShEeBhV97lP3gVQlKn2WSfYrBv FO13QneyMVMRoHgkFHJbZBs12tZKjMHtEa0MTAUMgKDBMDwlWDsDoBDmbItRUHyrPK53 ErTMY7YiLxztsbzNiBKbbSpazxE8Mr43rf2b/1qNb1A/AUzH+QSOI5RQTd+G5kLB9+IG WQLZGmKONZkbB/JiZIGd1NdmFn/meEtn7F/q/Ud3Js86wDa6XVV02tLMQTnaiH7yjRN7 AAhLLAQZYdVJ2jsPoDHwGIh9RZ0WjO5XUGAlB4neQOYdbbS/wFa+Ax6MMmVas9crmm6C RpOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=edq+C+dxs7umHf4KmwhaSCaSwNDJb/UOfsafkqfgmqE=; b=RGQRPDnGsbtutkisHb2wpEIa+hOpgVKv2EsjTkJsT7UHNGZR/Ns7iBZ3yLQ/knYj/x vJmNiUnAzYUuerQTty9N+2uX43hGs17EUFUB3igl6z99IYXaw5T2o/ltpQiAdG6uYAH8 wXIno0lpN2Jno6kyV90PRekeriB9R0ZgHeL5RqZnvUsVLCpJlRECXYrJWbHgklG9TCnE qF5zh+ruKt++8cmZX7kUQighnmymY6hVjwYm0WOLNgiy257M0yzVnB0eiMkyTa5lRYNr HHOHv6Urzm9fXg/27kZjbOvc1IhMz7Gqs7W9oGDqogshxTY230ykiDCvonSP/v1DQUJp tB8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j71si10132540pgd.404.2018.02.19.14.24.41; Mon, 19 Feb 2018 14:24:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932192AbeBSWYD (ORCPT + 99 others); Mon, 19 Feb 2018 17:24:03 -0500 Received: from mga11.intel.com ([192.55.52.93]:46789 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932130AbeBSWYC (ORCPT ); Mon, 19 Feb 2018 17:24:02 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2018 14:24:01 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,537,1511856000"; d="scan'208";a="19311349" Received: from rchatre-mobl.amr.corp.intel.com (HELO [10.255.73.9]) ([10.255.73.9]) by orsmga008.jf.intel.com with ESMTP; 19 Feb 2018 14:24:00 -0800 Subject: Re: [RFC PATCH V2 01/22] x86/intel_rdt: Documentation for Cache Pseudo-Locking To: Thomas Gleixner Cc: fenghua.yu@intel.com, tony.luck@intel.com, gavin.hindman@intel.com, vikas.shivappa@linux.intel.com, dave.hansen@intel.com, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org References: <9416db57e47e2040a7108ba269f5432d0c91f1f7.1518443616.git.reinette.chatre@intel.com> From: Reinette Chatre Message-ID: Date: Mon, 19 Feb 2018 14:24:00 -0800 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Thomas, On 2/19/2018 2:19 PM, Thomas Gleixner wrote: >> It is required that the user space application self sets affinity to >> cores associated with the cache. This is also highlighted in the example >> application code (later in this patch) within the comments as well as >> the example usage of sched_setaffinity(). The enforcement done in the >> kernel code is done as a check that the user space application did so, >> no the actual affinity management. > > Right, but your documentation claims it's enforced. There is no enforcement > aside of the initial sanity check. I see the confusion. I will fix the documentation to clarify that it is a sanity check. Thank you Reinette