Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1048793rwl; Wed, 12 Apr 2023 07:38:40 -0700 (PDT) X-Google-Smtp-Source: AKy350b460V5rTGw+tHBUI4a+LGFZhilv9Rc5OQosSfoW1yywvKQ97a9eCIxkmFAXbb++afCPlW5 X-Received: by 2002:a17:902:ec92:b0:1a6:62a2:2216 with SMTP id x18-20020a170902ec9200b001a662a22216mr5460152plg.65.1681310320229; Wed, 12 Apr 2023 07:38:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681310320; cv=none; d=google.com; s=arc-20160816; b=Yp9smC4UuGxAgheJe2x+S4nnDiZOaSmBLH7Njbf/rv2Hh6KIcX7x84Lt1tZlBGvZ/x uplZAm9Jk5X/dxzSWpwDQQp3eEz6VOtxIr4u9XV7UHAk3yhA39dC0q2XDxWm1ezrEhjo d2koTYKyeSqpYFaa/Zyvz3CP1zHHQLeUTxwWiyyk4p/1hjo+2YaioTaBKwmV0qYBGFV6 S3JyDAMkHQAkJmbHAMHtL2Yp4N+iQqgiNOHBbegEEcpzuPVSURxTokucKfW1UR2MSJNE QXF5rOJuWSMTUFpb7kLrlE3R2asqDc+B3BZC3Ubzu4gSl+QPbeQQFT1zv5pF+kbWzMZ7 oMhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=ON2HWeWAnfGA7NtsxyVjV2zWjOidj+0UwkI4RBMxgHg=; b=Q7qJ3VtL+YZBc8CEK4JMQGkMPjoITM56OtGLyngVSBoFH6dVlXxz40PwhekARhR9JW L2WS70q1FzPuc3FSWuTDeXh5KLFYAOqc3j5ZzDlmCZRR6c8wyEV56DTTEgfnTZsIl1v+ ECyGWBIeZd+f4IWFXsCQ6+SSq5TjHuC/76g3EMNADy17tbigCZH1YlGYitSnnSOah/kB jscqaHdlfHfVbgq2K9CtvjsW67a8sPjg8f4iiDQVSjHizxiwevdXkpBDuIg4n/cRy33n 5dcAUOjvcusb8NuMPrS5RoVmhAcvpYKZXdT3Hix/Pyl8xxNZ35WyIrfCmsmfsm6Gv4C5 Jtrg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JOr+Sp2L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l12-20020a170903120c00b0019a9834bb23si17683394plh.192.2023.04.12.07.38.10; Wed, 12 Apr 2023 07:38:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JOr+Sp2L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231718AbjDLOhZ (ORCPT + 99 others); Wed, 12 Apr 2023 10:37:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37828 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231685AbjDLOhQ (ORCPT ); Wed, 12 Apr 2023 10:37:16 -0400 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 134418A4A for ; Wed, 12 Apr 2023 07:36:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1681310207; x=1712846207; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=0SbRgH4B9R0dme4WybUJVxhIP/3Kp+V3KcyD6V1aOXw=; b=JOr+Sp2LvbCZ2ISuu4MGWcWxgxEWznGyWHkhNiw2EJwzE1ENTNoz66OZ fgLXvhaz+ukZGIkh3WqjAfRXg3b7ItdJUdu2Fc2YAdSvurs60w0ljvLCr 1qvTs+knlhIJhQvLuouf38ZX6yUMubGYwoUxwBIfZY/B/ZbAkYz2L+3vJ kNytzyvE37TFvkX940TmRS4OPy1tmrv9Jan9PtOvmzhjgYIdcTBao+0tR FGDZLZOH/t+3208z5Fm89HQm1DntPhOYq2y+wz8VvicuTo2Didq1DsZQ3 fDaV5tVPerwHQ3wjRTzn8PhKjp5P23KJ+0GhCaN7tRqHACyCjmE+3QtHc Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10678"; a="342669878" X-IronPort-AV: E=Sophos;i="5.98,339,1673942400"; d="scan'208";a="342669878" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2023 07:35:20 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10678"; a="719392833" X-IronPort-AV: E=Sophos;i="5.98,339,1673942400"; d="scan'208";a="719392833" Received: from johnmusg-mobl.amr.corp.intel.com (HELO [10.255.230.24]) ([10.255.230.24]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2023 07:35:20 -0700 Message-ID: Date: Wed, 12 Apr 2023 07:35:20 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.8.0 Subject: Re: [RFC PATCH] x86/fpu/xstate: Add more diagnostic information on inconsistent xstate sizes Content-Language: en-US To: Fenghua Yu , "Chang S. Bae" , Dave Hansen , Thomas Gleixner , Borislav Petkov , Ingo Molnar Cc: linux-kernel , x86 , Chintan M Patel , Thiago Macieira References: <20230405183942.734019-1-fenghua.yu@intel.com> <113918f9-0e44-3d46-8b48-028277ec26bb@intel.com> <2af114b9-2737-70e5-f534-e60416b52246@intel.com> <50e67263-33ba-9921-1bc2-a37b99bc2459@intel.com> From: Dave Hansen In-Reply-To: <50e67263-33ba-9921-1bc2-a37b99bc2459@intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/11/23 18:21, Fenghua Yu wrote: > In other words, splitting max_features into XCR0 and IA32_XSS and > showing them individually provide more useful debug info than one single > max_features value. > > Does it make sense? Not to me. >> I still expect some acknowledgment of what is coded here for the >> kernel calculation details. > > The kernel calculation is shown in > +        print_xstate_offset_size(); > +        pr_info("x86/fpu: total size: %u bytes\n", size); > > Isn't that detailed enough to show offset and size of each xstate and > sum of sizes? > > After that, > +    pr_info("x86/fpu: kernel_size from CPUID.0xd.0x%x:EBX: %u bytes\n", > +               compacted ? 1 : 0, kernel_size); > shows how kernel_size is calculated from CPUID? > > Using the above debug info, a real platform CPUID issue is shown clearly. > > What other details are needed? I was kinda hoping this would be a simple, non-controversial patch that would get us better debugging info the next time that the microcode or a bad VMM screws up. This patch isn't turning out to be as simple as I hoped. I was wrong. Let's just drop this.