Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp179978lqp; Tue, 11 Jun 2024 20:05:00 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW3Y3F7wK+4z1h37bPG0gGGnNl3LvEpcpsRjPN1mG7dYgx3ReT3lDAjGKFpWK6z9uGLeCq9CbI+iGFWjbDAgyIYvWdIgRhshhM9ZCpcvw== X-Google-Smtp-Source: AGHT+IFwJUq8jZu/NhRFE7HGY1ENuC1bbz7xe12bQL6cblk/0NbAM31GlfBUa9bmPM4Yim9d1fEO X-Received: by 2002:a05:6a20:3d8a:b0:1b8:54f8:3856 with SMTP id adf61e73a8af0-1b8a9b3514amr881800637.5.1718161500200; Tue, 11 Jun 2024 20:05:00 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718161500; cv=pass; d=google.com; s=arc-20160816; b=nf65eO6X/vKRmMfUhmJ4Uh7Jp3QJZGjkkNG/FpPcUCh4PJ/DJJBHiQoTeOndt+7WnF 09XUzf0JprKkCiTRlP1GmYN4/x/vwBFE0EknCYkITMguoOz7j90ZTeXxRqlhEiBljMMK tDk/F0fK0RIVIufWdIH0xuaCZqj61FGdPMVs9U2T0bt1xKH1hskjDIIjbv4RAfP49kck 4wCHd3pG06rr/w1XBLb4OSzRQNwPjzwVkrOWp13J2IJE0LLiM+3w43OCV9QFd/DGLc3C OQPSpUbB8q0gNDNZGkqI1/ndq5ZfKPpVwWkFKNEvTXk0e7jqx1EP1Qf7MM0VIvQUnIQH Mx1A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:autocrypt:from :content-language:references:cc:to:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature:dkim-filter; bh=jB1N2BWEhGdB47Ne04YM51CEeX4dLjKxuD2f4GC+EWw=; fh=G97U8XhUIOZCZrvFv+4KvfN6ItARnwP7E/NRDZmxJeM=; b=MO4jMg3sYPHUELpvjsASAs704qMbl1x8zhGxRPqWrdqZ7Kc+sOPYNtdLuuArjlN0E+ WV2Wn+ZbsvHCsCFQhtrMnGdSu18CzA2n0pHgmE2kzGcQ1Js+XQ7EQZVuPPpf73XiiwKq HpsLiODu09im3fOdVgD7bm2ROPQjxuPkLmuKuHy0Cj0KDiZO3GlIHLn7TKh3X6myv8SN NVbuY1DMxkMenGdb9qGTKbxewc6tKnmyP4mTO1jGbFNndVn9FUd9MAMD/BaDXpG1kV+2 6E2+GMdRH/FuzLj1Sr+A3bx9Eqh8qGVx4HORch/XJtAlAJ5Xcf8J5jTwcAIE0gmOJtY0 EdRA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@zytor.com header.s=2024051501 header.b=VWhxPaur; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-210849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210849-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2c4a970f93asi458480a91.62.2024.06.11.20.04.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jun 2024 20:05:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-210849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2024051501 header.b=VWhxPaur; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-210849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210849-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id C6FC2282696 for ; Wed, 12 Jun 2024 03:04:59 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 11CB71799B; Wed, 12 Jun 2024 03:04:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="VWhxPaur" Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AEAA23214; Wed, 12 Jun 2024 03:04:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718161493; cv=none; b=j3+xy3CwuLcllAu15sMo8TF0rd88dqo0AzbA3Sh2zV3Ta9XqFsE7RCv+LzbJ9fzZVrbKIYYiY9b/qvPaH8v2Uvq3kMFcwkKibp6g0ep1uAuXf+22Do9AO9YWJT6OMKSIi1FH0dm1GlBPe5JarJGCMEg7n8TH+r2M8IAfOVrBuTM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718161493; c=relaxed/simple; bh=AoulektFXDLQ9/pJbAPrcVrJPfngF/cjslcJtCvy3Us=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=rRT3BeKsCVrx+m/v+cZgmZrXqGl1X7X+4y2WFEWOOZX7yyMQYGHDn0SoNq0l4RQZuZwAJ/k+YEopCJ6/51qbdJDoJlarjkv5Wy/58B1HVN591nQObhkc5Ia7thimWMFB4krtQME5iBSnMVLZ8/a+bWCGYKcBVSBLwEvqzwG8JGE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=VWhxPaur; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Received: from [192.168.7.205] ([71.202.166.45]) (authenticated bits=0) by mail.zytor.com (8.17.2/8.17.1) with ESMTPSA id 45C34NPU3584446 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Tue, 11 Jun 2024 20:04:24 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 45C34NPU3584446 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2024051501; t=1718161465; bh=jB1N2BWEhGdB47Ne04YM51CEeX4dLjKxuD2f4GC+EWw=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=VWhxPaurms/Up2n5+kCHzbtIRpFwVI4635Zgj3+/nl0ZLbvq78nZYKk0Z0c9OQT0A Z43wybYmI/8+A/YLDz01QLjusiXRcjufpiZNU/ci3h0zqbBW0/jsmy/nzerF0+GEDp HIZ/4z42EFZNrxWMiGCEZLsm/edfMmNFpYIjBz+/OKTAPJ1IaUjPC5zM1PY8gRvgSi OgVMHIce+vqfUnzlBpa0WiWCyWlkxt6fDIbZ4bs62F9PIz6PG+JyGXiXaBhOE1Eu5C Iy+aXPsc+kZHJmpxVNG/YVk8D6pOyNRDQVrjfnHiSinA+dIjbef3QObu1g+vBxObBB MvCCc2d7KbHlw== Message-ID: <573ebc0d-cc2b-46ea-80d9-c92207933f14@zytor.com> Date: Tue, 11 Jun 2024 20:04:23 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 1/6] x86/irq: Add enumeration of NMI source reporting CPU feature To: "H. Peter Anvin" , Jacob Pan , X86 Kernel , LKML , Thomas Gleixner , Dave Hansen , Ingo Molnar , Borislav Petkov , linux-perf-users@vger.kernel.org, Peter Zijlstra Cc: Andi Kleen , Xin Li References: <20240611165457.156364-1-jacob.jun.pan@linux.intel.com> <20240611165457.156364-2-jacob.jun.pan@linux.intel.com> <34E0974A-45E0-4E98-9384-3A19D01ECF1E@zytor.com> Content-Language: en-US From: Xin Li Autocrypt: addr=xin@zytor.com; keydata= xsDNBGUPz1cBDACS/9yOJGojBFPxFt0OfTWuMl0uSgpwk37uRrFPTTLw4BaxhlFL0bjs6q+0 2OfG34R+a0ZCuj5c9vggUMoOLdDyA7yPVAJU0OX6lqpg6z/kyQg3t4jvajG6aCgwSDx5Kzg5 Rj3AXl8k2wb0jdqRB4RvaOPFiHNGgXCs5Pkux/qr0laeFIpzMKMootGa4kfURgPhRzUaM1vy bsMsL8vpJtGUmitrSqe5dVNBH00whLtPFM7IbzKURPUOkRRiusFAsw0a1ztCgoFczq6VfAVu raTye0L/VXwZd+aGi401V2tLsAHxxckRi9p3mc0jExPc60joK+aZPy6amwSCy5kAJ/AboYtY VmKIGKx1yx8POy6m+1lZ8C0q9b8eJ8kWPAR78PgT37FQWKYS1uAroG2wLdK7FiIEpPhCD+zH wlslo2ETbdKjrLIPNehQCOWrT32k8vFNEMLP5G/mmjfNj5sEf3IOKgMTMVl9AFjsINLHcxEQ 6T8nGbX/n3msP6A36FDfdSEAEQEAAc0WWGluIExpIDx4aW5Aenl0b3IuY29tPsLBDQQTAQgA NxYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89XBQkFo5qAAhsDBAsJCAcFFQgJCgsFFgID AQAACgkQa70OVx2uN1HUpgv/cM2fsFCQodLArMTX5nt9yqAWgA5t1srri6EgS8W3F+3Kitge tYTBKu6j5BXuXaX3vyfCm+zajDJN77JHuYnpcKKr13VcZi1Swv6Jx1u0II8DOmoDYLb1Q2ZW v83W55fOWJ2g72x/UjVJBQ0sVjAngazU3ckc0TeNQlkcpSVGa/qBIHLfZraWtdrNAQT4A1fa sWGuJrChBFhtKbYXbUCu9AoYmmbQnsx2EWoJy3h7OjtfFapJbPZql+no5AJ3Mk9eE5oWyLH+ QWqtOeJM7kKvn/dBudokFSNhDUw06e7EoVPSJyUIMbYtUO7g2+Atu44G/EPP0yV0J4lRO6EA wYRXff7+I1jIWEHpj5EFVYO6SmBg7zF2illHEW31JAPtdDLDHYcZDfS41caEKOQIPsdzQkaQ oW2hchcjcMPAfyhhRzUpVHLPxLCetP8vrVhTvnaZUo0xaVYb3+wjP+D5j/3+hwblu2agPsaE vgVbZ8Fx3TUxUPCAdr/p73DGg57oHjgezsDNBGUPz1gBDAD4Mg7hMFRQqlzotcNSxatlAQNL MadLfUTFz8wUUa21LPLrHBkUwm8RujehJrzcVbPYwPXIO0uyL/F///CogMNx7Iwo6by43KOy g89wVFhyy237EY76j1lVfLzcMYmjBoTH95fJC/lVb5Whxil6KjSN/R/y3jfG1dPXfwAuZ/4N cMoOslWkfZKJeEut5aZTRepKKF54T5r49H9F7OFLyxrC/uI9UDttWqMxcWyCkHh0v1Di8176 jjYRNTrGEfYfGxSp+3jYL3PoNceIMkqM9haXjjGl0W1B4BidK1LVYBNov0rTEzyr0a1riUrp Qk+6z/LHxCM9lFFXnqH7KWeToTOPQebD2B/Ah5CZlft41i8L6LOF/LCuDBuYlu/fI2nuCc8d m4wwtkou1Y/kIwbEsE/6RQwRXUZhzO6llfoN96Fczr/RwvPIK5SVMixqWq4QGFAyK0m/1ap4 bhIRrdCLVQcgU4glo17vqfEaRcTW5SgX+pGs4KIPPBE5J/ABD6pBnUUAEQEAAcLA/AQYAQgA JhYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89ZBQkFo5qAAhsMAAoJEGu9DlcdrjdR4C0L /RcjolEjoZW8VsyxWtXazQPnaRvzZ4vhmGOsCPr2BPtMlSwDzTlri8BBG1/3t/DNK4JLuwEj OAIE3fkkm+UG4Kjud6aNeraDI52DRVCSx6xff3bjmJsJJMb12mWglN6LjdF6K+PE+OTJUh2F dOhslN5C2kgl0dvUuevwMgQF3IljLmi/6APKYJHjkJpu1E6luZec/lRbetHuNFtbh3xgFIJx 2RpgVDP4xB3f8r0I+y6ua+p7fgOjDLyoFjubRGed0Be45JJQEn7A3CSb6Xu7NYobnxfkwAGZ Q81a2XtvNS7Aj6NWVoOQB5KbM4yosO5+Me1V1SkX2jlnn26JPEvbV3KRFcwV5RnDxm4OQTSk PYbAkjBbm+tuJ/Sm+5Yp5T/BnKz21FoCS8uvTiziHj2H7Cuekn6F8EYhegONm+RVg3vikOpn gao85i4HwQTK9/D1wgJIQkdwWXVMZ6q/OALaBp82vQ2U9sjTyFXgDjglgh00VRAHP7u1Rcu4 l75w1xInsg== In-Reply-To: <34E0974A-45E0-4E98-9384-3A19D01ECF1E@zytor.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 6/11/2024 7:50 PM, H. Peter Anvin wrote: > On June 11, 2024 7:32:54 PM PDT, Xin Li wrote: >> On 6/11/2024 9:54 AM, Jacob Pan wrote: >>> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig >>> index 1d7122a1883e..b8b15f20b94e 100644 >>> --- a/arch/x86/Kconfig >>> +++ b/arch/x86/Kconfig >>> @@ -511,12 +511,21 @@ config X86_CPU_RESCTRL >>> config X86_FRED >>> bool "Flexible Return and Event Delivery" >>> depends on X86_64 >>> + select X86_NMI_SOURCE >>> help >>> When enabled, try to use Flexible Return and Event Delivery >>> instead of the legacy SYSCALL/SYSENTER/IDT architecture for >>> ring transitions and exception/interrupt handling if the >>> system supports it. >>> +config X86_NMI_SOURCE >> >> Lets reuse X86_FRED instead of adding another hard config option. See >> below. >> >> With this, no need to add DISABLE_NMI_SOURCE to disabled-features.h: >> >> 1) If FRED is not available, NMI source won't be too. >> 2) If FRED is available but not enabled, all features relying on FRED >> should be cleared. We probably should move the feature bits clearing >> code into a static function when more such features are added in future. >> >>> /* Init cpu_entry_area before IST entries are set up */ >>> setup_cpu_entry_areas(); >> >> Thanks! >> Xin > > And even if we did, FRED should not *select* NMI_SOURCE; the dependency goes the other way. Right, I was a bit of confused but was focusing on why do we need this.