Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp109583lqo; Thu, 9 May 2024 14:18:43 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWh+LldC6KBMWR/bFp17S+6K/4Bolh2Gp37jX26uqSrSytOB5OTfQOnYkMSAEdD/pMgvMPvNpjK/ViZ9Sg1Wl47RoBADuKr9CUg2oXbnQ== X-Google-Smtp-Source: AGHT+IGG++pzKOOvcYXFl2KovyxruitOEPZwXLgz/vdkPZ869AyNhRAwAsqZ4wpaOytf0Cct3eFU X-Received: by 2002:a05:6a20:9747:b0:1af:8fa8:3126 with SMTP id adf61e73a8af0-1afde07cd39mr1048824637.6.1715289523140; Thu, 09 May 2024 14:18:43 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715289523; cv=pass; d=google.com; s=arc-20160816; b=c/wtmYGSH+48NBtCkLV0tnrnq8FK22117VKLjSXzzWDGdXkXVSsUzVSpoTIw3fi+qD VOqWKInx95SewlsLPudx8rgOlprcAjHUKHdm7Q0JxjJCqJEatEi1VxT2gwuVj/cO7voM cJxx8T3UpfCazufNLMmve345ujT/eEPyDammEbkbARNHwCnk0pBf2pYLIqtFJ5efUVch kWlcO+NzjvMY+uwehkyjz/gc0YsbEFadRFO8dI9iJL4n2jnTuT/0HNnJDs8vOS0SHJqD WvYM8LI++Fq7dRy7hkSPqlFKmi3gTO4TAX6hPgbP33liYglNGf3YY3ZzkHY4XbqFIgYj Cd7Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature:dkim-filter; bh=OTVyo9YSZWN/DVt1cJEYkHWbfxp9X5uqNNbX2ey6OEQ=; fh=88woEVmZlmuPsYsOsKUvzMUMO3h60xp7RLa/S0+h53Q=; b=MEF6rv4iU1GrcwswHh++E3P3nWuGqagYBcGLarcJF0dHIi5qWpWjMP3qxUbQ6mlgUF x22LC0DW51wE8FXlLLs6w3tH5HrefP+K9V5D6DgBeaY0w5Y5OYRozPNyZKeLZkC1zSPP 9Lc9FEVziCjPEhkykl16529TYGgIAps4bcTEC5gi9BSYY/ocYzcWbMhAOSqOx2mJYKUe 2XeLg8BUapTwSqLaHDGfgaMiNJTCheZerzDOgh0WdqNf7VkTpd1RD3MIzrPnY8NZWNC9 L+QiR4Y1W/6qyZhQaEFhmF+Avs9jhy+JLLyPlzS7VPxVVwU/SCPfC1b0sytNNHyVV2A0 crrQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@zytor.com header.s=2024041401 header.b=CKwN7ElF; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-174977-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-174977-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id 41be03b00d2f7-634103f68aesi2151269a12.320.2024.05.09.14.18.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 May 2024 14:18:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-174977-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2024041401 header.b=CKwN7ElF; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-174977-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-174977-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id DCC702848F5 for ; Thu, 9 May 2024 21:18:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 87E741272AB; Thu, 9 May 2024 21:18:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="CKwN7ElF" Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9512086244; Thu, 9 May 2024 21:18:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715289487; cv=none; b=DA/UpMdRGU/k66KtSTdHPdtQwfOZGr0vNX1fVseZhqEdH/OuWbMdz9INZgywbLMOKMRuyxZlv69bpMnKUWlbKjofwWB62u+xDKf0HZ3FirUlaHDDSnPar6hATXVcfPnBXV5XknWwviPR1mAIWN4iLSo/bQmiD0wegSI4H9ED5pg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715289487; c=relaxed/simple; bh=hglL0exCKjz/E+QzHIuBkoQgPJXIjr7oH1aPnKQ+0So=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=e6huKjt71gEq9JGUeiZlhyth0PnlISeD8wm4GG9W/y57CBUn0PZYPItbpey6aNod1fSgY5I4+b/1hCO8W6SPGr4p8zlT2TmOuaI7hj2HeEBvHW2ZQ1EyLemnXpw2hdAnhjb+gogA9wNVWj/ijDXHk1hR0K3CLBWdKOZm2gg96as= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=CKwN7ElF; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Received: from terminus.zytor.com (terminus.zytor.com [IPv6:2607:7c80:54:3:0:0:0:136]) (authenticated bits=0) by mail.zytor.com (8.17.2/8.17.1) with ESMTPSA id 449KrevT275586 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 9 May 2024 13:53:46 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 449KrevT275586 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2024041401; t=1715288027; bh=OTVyo9YSZWN/DVt1cJEYkHWbfxp9X5uqNNbX2ey6OEQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CKwN7ElFF/6ssDeGIstMy8aredFlRF/gusg7Uh5E2XAChgJ684lIk4GhMrxnY9w4r lYDaNKbI06ZQMmynD0gY6iMlZtcYxsRZVwf+/h26QdCfZMtAEt3ckRCxc0HlLK27pe nXf/eSfAuThUu+9iol42fplC7KCKcUpXc6utAXKTmIGVelzjj/F4Aex+ey6Bwm4HNY ix44WZhLVHLgZuak4HH4YB/KwUFoMs6ZW8uzhbdphHSOCFSwmw2fC6N1pfwWkqjd6A BF28WLkvJlzbbr++9qd69Y7mXPyu4wf8mEF6M3DTGZz6jPA9u48vqUu/CSiaBDq7ky CLdsV0PD9pfMQ== From: "Xin Li (Intel)" To: linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, will@kernel.org, peterz@infradead.org, akpm@linux-foundation.org, acme@kernel.org, namhyung@kernel.org Subject: [RESEND v1 2/3] x86/cpufeatures: Generate a feature mask header based on build config Date: Thu, 9 May 2024 13:53:39 -0700 Message-ID: <20240509205340.275568-3-xin@zytor.com> X-Mailer: git-send-email 2.45.0 In-Reply-To: <20240509205340.275568-1-xin@zytor.com> References: <20240509205340.275568-1-xin@zytor.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: "H. Peter Anvin (Intel)" Introduce an AWK script to auto-generate a header with required and disabled feature masks based on and current build config. Thus for any CPU feature with a build config, e.g., X86_FRED, simply add config X86_DISABLED_FEATURE_FRED def_bool y depends on !X86_FRED to arch/x86/Kconfig.cpufeatures, instead of adding a conditional CPU feature disable flag, e.g., DISABLE_FRED. Besides, the generated required and disabled feature masks will be added to their corresponding CPU feature masks automatically. [ Xin: build integration improvements ] Signed-off-by: H. Peter Anvin (Intel) Signed-off-by: Xin Li (Intel) --- arch/x86/Makefile | 17 ++++- arch/x86/boot/cpucheck.c | 3 +- arch/x86/boot/cpuflags.c | 1 - arch/x86/boot/mkcpustr.c | 3 +- arch/x86/include/asm/Kbuild | 1 + arch/x86/include/asm/cpufeature.h | 1 + arch/x86/include/asm/cpufeatures.h | 8 --- arch/x86/kernel/verify_cpu.S | 1 + arch/x86/tools/featuremasks.awk | 108 +++++++++++++++++++++++++++++ 9 files changed, 129 insertions(+), 14 deletions(-) create mode 100755 arch/x86/tools/featuremasks.awk diff --git a/arch/x86/Makefile b/arch/x86/Makefile index 5ab93fcdd691..2a364fe0a5b4 100644 --- a/arch/x86/Makefile +++ b/arch/x86/Makefile @@ -241,9 +241,22 @@ archscripts: scripts_basic $(Q)$(MAKE) $(build)=arch/x86/tools relocs ### -# Syscall table generation +# Feature masks header and syscall table generation -archheaders: +out := arch/x86/include/generated/asm +featuremasks_hdr := featuremasks.h +featuremasks_awk := $(srctree)/arch/x86/tools/featuremasks.awk +cpufeatures_hdr := $(srctree)/arch/x86/include/asm/cpufeatures.h +quiet_cmd_gen_featuremasks = GEN $@ + cmd_gen_featuremasks = $(AWK) -f $(featuremasks_awk) $(cpufeatures_hdr) $(KCONFIG_CONFIG) > $@ + +$(out)/$(featuremasks_hdr): $(featuremasks_awk) $(cpufeatures_hdr) $(KCONFIG_CONFIG) FORCE + $(shell mkdir -p $(out)) + $(call if_changed,gen_featuremasks) + +targets += $(out)/$(featuremasks_hdr) + +archheaders: $(out)/$(featuremasks_hdr) $(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all ### diff --git a/arch/x86/boot/cpucheck.c b/arch/x86/boot/cpucheck.c index fed8d13ce252..49b982c4e932 100644 --- a/arch/x86/boot/cpucheck.c +++ b/arch/x86/boot/cpucheck.c @@ -22,10 +22,11 @@ # include "boot.h" #endif #include +#include #include #include -#include #include + #include "string.h" #include "msr.h" diff --git a/arch/x86/boot/cpuflags.c b/arch/x86/boot/cpuflags.c index d75237ba7ce9..0cabdacb2a2f 100644 --- a/arch/x86/boot/cpuflags.c +++ b/arch/x86/boot/cpuflags.c @@ -3,7 +3,6 @@ #include "bitops.h" #include -#include #include #include "cpuflags.h" diff --git a/arch/x86/boot/mkcpustr.c b/arch/x86/boot/mkcpustr.c index da0ccc5de538..b90110109675 100644 --- a/arch/x86/boot/mkcpustr.c +++ b/arch/x86/boot/mkcpustr.c @@ -12,8 +12,6 @@ #include -#include "../include/asm/required-features.h" -#include "../include/asm/disabled-features.h" #include "../include/asm/cpufeatures.h" #include "../include/asm/vmxfeatures.h" #include "../kernel/cpu/capflags.c" @@ -23,6 +21,7 @@ int main(void) int i, j; const char *str; + printf("#include \n\n"); printf("static const char x86_cap_strs[] =\n"); for (i = 0; i < NCAPINTS; i++) { diff --git a/arch/x86/include/asm/Kbuild b/arch/x86/include/asm/Kbuild index a192bdea69e2..29c3481f40fc 100644 --- a/arch/x86/include/asm/Kbuild +++ b/arch/x86/include/asm/Kbuild @@ -8,6 +8,7 @@ generated-y += syscalls_x32.h generated-y += unistd_32_ia32.h generated-y += unistd_64_x32.h generated-y += xen-hypercalls.h +generated-y += featuremasks.h generic-y += early_ioremap.h generic-y += mcs_spinlock.h diff --git a/arch/x86/include/asm/cpufeature.h b/arch/x86/include/asm/cpufeature.h index 0b9611da6c53..8332f596ba3c 100644 --- a/arch/x86/include/asm/cpufeature.h +++ b/arch/x86/include/asm/cpufeature.h @@ -9,6 +9,7 @@ #include #include #include +#include enum cpuid_leafs { diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h index 3c7434329661..05503448b94d 100644 --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -2,14 +2,6 @@ #ifndef _ASM_X86_CPUFEATURES_H #define _ASM_X86_CPUFEATURES_H -#ifndef _ASM_X86_REQUIRED_FEATURES_H -#include -#endif - -#ifndef _ASM_X86_DISABLED_FEATURES_H -#include -#endif - /* * Defines x86 CPU feature bits */ diff --git a/arch/x86/kernel/verify_cpu.S b/arch/x86/kernel/verify_cpu.S index 1258a5872d12..3205cbb47b9c 100644 --- a/arch/x86/kernel/verify_cpu.S +++ b/arch/x86/kernel/verify_cpu.S @@ -29,6 +29,7 @@ */ #include +#include #include SYM_FUNC_START_LOCAL(verify_cpu) diff --git a/arch/x86/tools/featuremasks.awk b/arch/x86/tools/featuremasks.awk new file mode 100755 index 000000000000..2af32c60fc76 --- /dev/null +++ b/arch/x86/tools/featuremasks.awk @@ -0,0 +1,108 @@ +#!/usr/bin/awk +# +# Convert cpufeatures.h to a list of compile-time masks +# Note: this blithly assumes that each word has at least one +# feature defined in it; if not, something else is wrong! +# + +BEGIN { + printf "#ifndef _ASM_X86_FEATUREMASKS_H\n"; + printf "#define _ASM_X86_FEATUREMASKS_H\n\n"; + + file = 0 +} + +BEGINFILE { + switch (++file) { + case 1: # cpufeatures.h + FPAT = "#[ \t]*[a-z]+|[A-Za-z0-9_]+|[^ \t]"; + break; + case 2: # .config + FPAT = "CONFIG_[A-Z0-9_]+|is not set|[yn]"; + break; + } +} + +file == 1 && $1 ~ /^#[ \t]*define$/ && $2 ~ /^X86_FEATURE_/ && +$3 == "(" && $5 == "*" && $7 == "+" && $9 == ")" { + nfeat = $4 * $6 + $8; + feat = $2; + sub(/^X86_FEATURE_/, "", feat); + feats[nfeat] = feat; +} +file == 1 && $1 ~ /^#[ \t]*define$/ && $2 == "NCAPINTS" { + ncapints = strtonum($3); +} + +file == 2 && $1 ~ /^CONFIG_X86_[A-Z]*_FEATURE_/ { + on = ($2 == "y"); + printf "/* %s = %s (%d) */\n", $1, $2, on; + if (split($1, fs, "CONFIG_X86_|_FEATURE_") == 3) { + printf "/* %s %s = %d */\n", fs[2], fs[3], on; + featstat[fs[2], fs[3]] = on; + } +} + +END { + sets[1] = "REQUIRED"; + sets[2] = "DISABLED"; + + for (ns in sets) { + s = sets[ns]; + + printf "/*\n"; + printf " * %s features:\n", s; + printf " *\n"; + fstr = ""; + for (i = 0; i < ncapints; i++) { + mask = 0; + for (j = 0; j < 32; j++) { + nfeat = i*32 + j; + feat = feats[nfeat]; + if (feat) { + st = !!featstat[s, feat]; + if (st) { + nfstr = fstr " " feat; + if (length(nfstr) > 72) { + printf " * %s\n", fstr; + nfstr = " " feat; + } + fstr = nfstr; + } + mask += st * (2 ^ j); + } + } + masks[i] = mask; + } + printf " * %s\n */\n\n", fstr; + + for (i = 0; i < ncapints; i++) { + printf "#define %s_MASK%-3d 0x%08x\n", s, i, masks[i]; + } + + printf "\n#define %s_MASKS ", s; + pfx = "{"; + for (i = 0; i < ncapints; i++) { + printf "%s \\\n\t%s_MASK_%d", pfx, s, i; + pfx = ","; + } + printf " \\\n}\n\n"; + + printf "#define %s_FEATURE(x) \\\n", s; + printf "\t((( "; + for (i = 0; i < ncapints; i++) { + if (masks[i]) { + printf "\\\n\t\t((x) >> 5) == %2d ? %s_MASK%-3d : ", i, s, i; + } + } + printf "0 \\\n"; + printf "\t) >> ((x) & 31)) & 1)\n\n"; + + printf "#define %s_MASK_CHECK BUILD_BUG_ON_ZERO(NCAPINTS != %d)\n\n", s, ncapints; + } + + printf "#define SSE_MASK\t\\\n"; + printf "\t(REQUIRED_MASK0 & ((1<<(X86_FEATURE_XMM & 31)) | (1<<(X86_FEATURE_XMM2 & 31))))\n\n"; + + printf "#endif /* _ASM_X86_FEATUREMASKS_H */\n"; +} -- 2.45.0