Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp1101817pxb; Fri, 1 Oct 2021 03:36:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyiVwNSr27wslj/i7zkh5yGtdb3mwZICAfqXpUsN7sHuqeq/Zdks4Yu2yWXIzrRWRWV6KUn X-Received: by 2002:a63:4520:: with SMTP id s32mr9114147pga.27.1633084616754; Fri, 01 Oct 2021 03:36:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633084616; cv=none; d=google.com; s=arc-20160816; b=ZUpQy1RKLzwvcTWLMwIwnNXQjMPjw0nsn2iQKUMjALmSIHz3xKk9hgxykOG90cOk1c T9VSs2UgxC3upQ2830XaB2vDBoreEdVf9CEFv0MTeGzAwcOsWex45L/U7a8xOrNPLoTW BOtK+3QelOVVJ+1fqkBZjEKG3z3Ybmx+tFfI+e6LDfTvmlIgPdPFhpn/UWbto0TnI1QK hS9u0S07sKtyH7OpMW7gtnfp/I4XKP9c797d8xuddB6FdxATMhLVdicoAQEqIEoudOPw 8y1+4f+uxlm0l2QVR+p/5MyU40KTyHXH+4Iohmu/7ExZ2zd1N0ErEh8PkK5vv23Ou5wK 7cxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=R6OJEb+D8lZ2x/REFKVNMri6bfFbDU+BKHstrL/3mog=; b=CCOwlNuKGMYzuQSsqp5ffez3uOSzSOOs92Tz/mDwq43ZNf3amh6KgtlQv2dO9FIh9t LmL/Gky/yK3uy4JA4os5xDk70XVnD13dDWdPel52l2MHUJfKEGd3hbj6uwW0nc38JpST GuRaYgPs9z1c0OJuVAG35xhY2LvVl4sTivoidypqkpsBp8ZgapKbhbk7yl8Y6IW24A42 LJKNL1rKa08FiqsihPf3rBmQr8rrJO23MQEwshiZShC4O4ase3ZiKL0VIt83OY+ITzUt y6GKGKFzxGaVEnhiGlsc05Vjif/WPawzYbYILZgkGxxDV3fMKZFlkNzrNrsh5cSiUX/A /zUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t27si6790227pga.217.2021.10.01.03.36.43; Fri, 01 Oct 2021 03:36:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352157AbhJAIUv (ORCPT + 99 others); Fri, 1 Oct 2021 04:20:51 -0400 Received: from jabberwock.ucw.cz ([46.255.230.98]:48808 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231161AbhJAIUt (ORCPT ); Fri, 1 Oct 2021 04:20:49 -0400 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 6A8331C0B80; Fri, 1 Oct 2021 10:19:04 +0200 (CEST) Date: Fri, 1 Oct 2021 10:19:03 +0200 From: Pavel Machek To: Sohil Mehta Cc: x86@kernel.org, Tony Luck , Dave Hansen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Andy Lutomirski , Jens Axboe , Christian Brauner , Peter Zijlstra , Shuah Khan , Arnd Bergmann , Jonathan Corbet , Ashok Raj , Jacob Pan , Gayatri Kammela , Zeng Guang , Dan Williams , Randy E Witt , Ravi V Shankar , Ramesh Thomas , linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: Re: [RFC PATCH 00/13] x86 User Interrupts support Message-ID: <20211001081903.GA18962@amd> References: <20210913200132.3396598-1-sohil.mehta@intel.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="WIyZ46R2i8wDzkSu" Content-Disposition: inline In-Reply-To: <20210913200132.3396598-1-sohil.mehta@intel.com> User-Agent: Mutt/1.5.23 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --WIyZ46R2i8wDzkSu Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > Instructions > ------------ > senduipi - send a user IPI to a target task based on the UITT ind= ex. >=20 > clui - Mask user interrupts by clearing UIF (User Interrupt Flag). >=20 > stui - Unmask user interrupts by setting UIF. >=20 > testui - Test current value of UIF. >=20 > uiret - return from a user interrupt handler. Are other CPU vendors allowed to implement compatible instructions? If not, we should probably have VDSO entries so kernel can abstract differences between CPUs. > Untrusted processes > ------------------- > The current implementation expects only trusted and cooperating processes= to > communicate using user interrupts. Coordination is expected between proce= sses > for a connection teardown. In situations where coordination doesn't happen > (say, due to abrupt process exit), the kernel would end up keeping shared > resources (like UPID) allocated to avoid faults. Keeping resources allocated after process exit is a no-no. Best regards, Pavel --=20 http://www.livejournal.com/~pavelmachek --WIyZ46R2i8wDzkSu Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAmFWxHcACgkQMOfwapXb+vJxvwCfT//NrkD3M2U42/1DYnf87idv hk0AoJONzceoKozw6x+bt0MVUuWLOpzR =eUmo -----END PGP SIGNATURE----- --WIyZ46R2i8wDzkSu--