Received: by 2002:a89:413:0:b0:1fd:dba5:e537 with SMTP id m19csp1728946lqs; Sun, 16 Jun 2024 01:58:30 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU3D9Qgc9h2jdME+CwbHDC88HVoG8HOOajuyiIF9DuHaCgb7DFrpE4GbSfwmM2LKKpbTeGgFoaIbYOfArA7UzszFlI06OuPjqHFTceUbw== X-Google-Smtp-Source: AGHT+IHeIQSZTF8roZS7wZ40m39WC8R3qUo4xOri14VVep0X5OdvlCAAZzm8ZVKWiG9aGCtAITbd X-Received: by 2002:a0c:de12:0:b0:6b0:806e:400d with SMTP id 6a1803df08f44-6b2afd8478amr72532126d6.58.1718528309957; Sun, 16 Jun 2024 01:58:29 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718528309; cv=pass; d=google.com; s=arc-20160816; b=ToTlyGay14NuUy4WbvLUizrEVqScC5IlY1QJm/zO2RiysKhlJxDIUEONI/sBS5Lm6W rVTQndLEk00F694LS1WSXbOLWYvC9E39FNp9O7iWJ7n9kLC7Tf6PP9E7UtcyHHtRsd1N cTLhO+HzCXbyPWNG07zobDsjwMIZFHutBMzrrLeZsJ8a04o28hbwIJFJ0xFZFT4k2l0W MFbQQcK6s/3cjbuNyUWwZjwqDMQe1lsBTWSCPniwIyO3+8+BLrkJrwr961Zp3CMbUDAo s/pMnkFTqGUaZIbgeW+rH89Y+nuW+FVHnuFeQn7huxV3us48lSLvtpHmMSssUqNNwT79 fL8g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature:dkim-filter; bh=iPAXjWwN2MGwbB9pC+v7lWxJrTFou1Ma19nIwDUSOY4=; fh=88woEVmZlmuPsYsOsKUvzMUMO3h60xp7RLa/S0+h53Q=; b=zTU5FTe92Tfy9u62LaFoHHZWRJbK6QlksN2OJwOqzHFJqatXhHbHr2oa6AEnIDBctC 7GsMwmwEStEV5/3OwvVnnG2wT9nK3lhMYyzlZLxsl3gG3K6qu4TdQ7BBm5Wtoyv8nS/I kdRn68WhmRvhfv2GBMNx4sJF6cbWY6D4Q3FAzj4iYsNp3peEd0lWVu2qTmML5lNy7kcS 2zGFvhx3QxABonAg5edIic2Zrm528g/wXzE1DlOxZwwUT4nZTfDP8omyuiceWNF+1GHL UP31twbUt1EO5Rw9ngAK9bYJqsIWveOp9F1N3MqLtUZPrUYeNl0hOwyXccYuirrJ2Xsg grjA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@zytor.com header.s=2024051501 header.b=JGFos2a2; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-216207-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-216207-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id 6a1803df08f44-6b2a5b98897si74715746d6.612.2024.06.16.01.58.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 16 Jun 2024 01:58:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-216207-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2024051501 header.b=JGFos2a2; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-216207-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-216207-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 9DFB31C20A78 for ; Sun, 16 Jun 2024 08:58:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 70128181CFA; Sun, 16 Jun 2024 08:58:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="JGFos2a2" Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 949CD61FF0; Sun, 16 Jun 2024 08:58:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718528298; cv=none; b=k55igVM6X6/pjT1fO8vCJYppt9j9tglNORxE408RpktNABPwl2Ajm70FB4KLDNSyzqdpWaN2y5Z3TvdOtVowixC0fQtdLuJxTw4uTG0ULliaM3Hhzv9pnsXE4dAhUVukmQdtuLy7JIBY5xVm2/tP+b4Qc0bAkk/OSSvRZf13jzs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718528298; c=relaxed/simple; bh=wuNK9dtOdWJyqDQMvVeDxjyUBmY4JRKC41H2HAqQLWk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=BvrL1gaQMcmcz/AT1X7MxWs7iS/v0yk2m5M9GQ2l3j65rrnCClt6f8WL7/43pRpbggDcwFz9bbkJI13cwBqpWNS2TAR6iSbzi1A57L9inQtoKN8aiu8cvLdK/vLDCUO24PtmHrueUwxSbMmfhkeHwvDRBh3Z95nV+Zrxy5TB1f8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=JGFos2a2; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Received: from terminus.zytor.com (terminus.zytor.com [IPv6:2607:7c80:54:3:0:0:0:136]) (authenticated bits=0) by mail.zytor.com (8.17.2/8.17.1) with ESMTPSA id 45G8viDl1100721 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 16 Jun 2024 01:57:50 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 45G8viDl1100721 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2024051501; t=1718528270; bh=iPAXjWwN2MGwbB9pC+v7lWxJrTFou1Ma19nIwDUSOY4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JGFos2a2UeoPx+u2vQZjDkkm6vKjstJdXy7nzAW3/X+VIYfCT8fImq56rBQp0fzpB 1J4r/Fe87NyicjdxdtamHObwUOBPDORUdlB/mu5FwOhs8im2dZuxuJHsdZwmkEUfr3 VducvM3ELTSWUp57qjyjKLFHzlTngBiJOVVr7xJNiTlEoDF53Q/6ihbqiYIDF7bFIU /SBRMyCpIf8c9vG3YItGyK3274HhgKs9BYVMKXPYK+XW5SBz53bSZdbW6Qm1BFD0wR J8GboRLZeM13ADH2wrbvE2DLKkGdbPTfXynDHpWaGfysZ060OGLPzSUxLB74ON9g/s EihfoPiij8a/g== From: "Xin Li (Intel)" To: linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, will@kernel.org, peterz@infradead.org, akpm@linux-foundation.org, acme@kernel.org, namhyung@kernel.org Subject: [PATCH v2 2/3] x86/cpufeatures: Generate a feature mask header based on build config Date: Sun, 16 Jun 2024 01:57:42 -0700 Message-ID: <20240616085743.1100704-3-xin@zytor.com> X-Mailer: git-send-email 2.45.1 In-Reply-To: <20240616085743.1100704-1-xin@zytor.com> References: <20240616085743.1100704-1-xin@zytor.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: "H. Peter Anvin (Intel)" Introduce an AWK script to auto-generate a header with required and disabled feature masks based on and current build config. Thus for any CPU feature with a build config, e.g., X86_FRED, simply add config X86_DISABLED_FEATURE_FRED def_bool y depends on !X86_FRED to arch/x86/Kconfig.cpufeatures, instead of adding a conditional CPU feature disable flag, e.g., DISABLE_FRED. Lastly the generated required and disabled feature masks will be added to their corresponding feature masks for this particular compile-time configuration. [ Xin: build integration improvements ] Signed-off-by: H. Peter Anvin (Intel) Signed-off-by: Xin Li (Intel) --- Change since v1: * Remove code generating unused macros {REQUIRED,DISABLED}_FEATURE(x) to tell if a CPU feature, e.g., X86_FEATURE_FRED, is a required or disabled feature for this particular compile-time configuration. --- arch/x86/Makefile | 17 +++++- arch/x86/boot/cpucheck.c | 3 +- arch/x86/boot/cpuflags.c | 1 - arch/x86/boot/mkcpustr.c | 3 +- arch/x86/include/asm/Kbuild | 1 + arch/x86/include/asm/cpufeature.h | 1 + arch/x86/include/asm/cpufeatures.h | 8 --- arch/x86/kernel/verify_cpu.S | 1 + arch/x86/tools/featuremasks.awk | 90 ++++++++++++++++++++++++++++++ 9 files changed, 111 insertions(+), 14 deletions(-) create mode 100755 arch/x86/tools/featuremasks.awk diff --git a/arch/x86/Makefile b/arch/x86/Makefile index 801fd85c3ef6..211c0820b150 100644 --- a/arch/x86/Makefile +++ b/arch/x86/Makefile @@ -261,9 +261,22 @@ archscripts: scripts_basic $(Q)$(MAKE) $(build)=arch/x86/tools relocs ### -# Syscall table generation +# Feature masks header and syscall table generation -archheaders: +out := arch/x86/include/generated/asm +featuremasks_hdr := featuremasks.h +featuremasks_awk := $(srctree)/arch/x86/tools/featuremasks.awk +cpufeatures_hdr := $(srctree)/arch/x86/include/asm/cpufeatures.h +quiet_cmd_gen_featuremasks = GEN $@ + cmd_gen_featuremasks = $(AWK) -f $(featuremasks_awk) $(cpufeatures_hdr) $(KCONFIG_CONFIG) > $@ + +$(out)/$(featuremasks_hdr): $(featuremasks_awk) $(cpufeatures_hdr) $(KCONFIG_CONFIG) FORCE + $(shell mkdir -p $(out)) + $(call if_changed,gen_featuremasks) + +targets += $(out)/$(featuremasks_hdr) + +archheaders: $(out)/$(featuremasks_hdr) $(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all ### diff --git a/arch/x86/boot/cpucheck.c b/arch/x86/boot/cpucheck.c index 0aae4d4ed615..8d03a741d1b2 100644 --- a/arch/x86/boot/cpucheck.c +++ b/arch/x86/boot/cpucheck.c @@ -22,10 +22,11 @@ # include "boot.h" #endif #include +#include #include #include -#include #include + #include "string.h" #include "msr.h" diff --git a/arch/x86/boot/cpuflags.c b/arch/x86/boot/cpuflags.c index d75237ba7ce9..0cabdacb2a2f 100644 --- a/arch/x86/boot/cpuflags.c +++ b/arch/x86/boot/cpuflags.c @@ -3,7 +3,6 @@ #include "bitops.h" #include -#include #include #include "cpuflags.h" diff --git a/arch/x86/boot/mkcpustr.c b/arch/x86/boot/mkcpustr.c index da0ccc5de538..b90110109675 100644 --- a/arch/x86/boot/mkcpustr.c +++ b/arch/x86/boot/mkcpustr.c @@ -12,8 +12,6 @@ #include -#include "../include/asm/required-features.h" -#include "../include/asm/disabled-features.h" #include "../include/asm/cpufeatures.h" #include "../include/asm/vmxfeatures.h" #include "../kernel/cpu/capflags.c" @@ -23,6 +21,7 @@ int main(void) int i, j; const char *str; + printf("#include \n\n"); printf("static const char x86_cap_strs[] =\n"); for (i = 0; i < NCAPINTS; i++) { diff --git a/arch/x86/include/asm/Kbuild b/arch/x86/include/asm/Kbuild index a192bdea69e2..29c3481f40fc 100644 --- a/arch/x86/include/asm/Kbuild +++ b/arch/x86/include/asm/Kbuild @@ -8,6 +8,7 @@ generated-y += syscalls_x32.h generated-y += unistd_32_ia32.h generated-y += unistd_64_x32.h generated-y += xen-hypercalls.h +generated-y += featuremasks.h generic-y += early_ioremap.h generic-y += mcs_spinlock.h diff --git a/arch/x86/include/asm/cpufeature.h b/arch/x86/include/asm/cpufeature.h index 0b9611da6c53..8332f596ba3c 100644 --- a/arch/x86/include/asm/cpufeature.h +++ b/arch/x86/include/asm/cpufeature.h @@ -9,6 +9,7 @@ #include #include #include +#include enum cpuid_leafs { diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h index 3c7434329661..05503448b94d 100644 --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -2,14 +2,6 @@ #ifndef _ASM_X86_CPUFEATURES_H #define _ASM_X86_CPUFEATURES_H -#ifndef _ASM_X86_REQUIRED_FEATURES_H -#include -#endif - -#ifndef _ASM_X86_DISABLED_FEATURES_H -#include -#endif - /* * Defines x86 CPU feature bits */ diff --git a/arch/x86/kernel/verify_cpu.S b/arch/x86/kernel/verify_cpu.S index 1258a5872d12..3205cbb47b9c 100644 --- a/arch/x86/kernel/verify_cpu.S +++ b/arch/x86/kernel/verify_cpu.S @@ -29,6 +29,7 @@ */ #include +#include #include SYM_FUNC_START_LOCAL(verify_cpu) diff --git a/arch/x86/tools/featuremasks.awk b/arch/x86/tools/featuremasks.awk new file mode 100755 index 000000000000..c96e6cf43161 --- /dev/null +++ b/arch/x86/tools/featuremasks.awk @@ -0,0 +1,90 @@ +#!/usr/bin/awk +# +# Convert cpufeatures.h to a list of compile-time masks +# Note: this blithly assumes that each word has at least one +# feature defined in it; if not, something else is wrong! +# + +BEGIN { + printf "#ifndef _ASM_X86_FEATUREMASKS_H\n"; + printf "#define _ASM_X86_FEATUREMASKS_H\n\n"; + + file = 0 +} + +BEGINFILE { + switch (++file) { + case 1: # cpufeatures.h + FPAT = "#[ \t]*[a-z]+|[A-Za-z0-9_]+|[^ \t]"; + break; + case 2: # .config + FPAT = "CONFIG_[A-Z0-9_]+|is not set|[yn]"; + break; + } +} + +file == 1 && $1 ~ /^#[ \t]*define$/ && $2 ~ /^X86_FEATURE_/ && +$3 == "(" && $5 == "*" && $7 == "+" && $9 == ")" { + nfeat = $4 * $6 + $8; + feat = $2; + sub(/^X86_FEATURE_/, "", feat); + feats[nfeat] = feat; +} +file == 1 && $1 ~ /^#[ \t]*define$/ && $2 == "NCAPINTS" { + ncapints = strtonum($3); +} + +file == 2 && $1 ~ /^CONFIG_X86_[A-Z]*_FEATURE_/ { + on = ($2 == "y"); + printf "/* %s = %s (%d) */\n", $1, $2, on; + if (split($1, fs, "CONFIG_X86_|_FEATURE_") == 3) { + printf "/* %s %s = %d */\n", fs[2], fs[3], on; + featstat[fs[2], fs[3]] = on; + } +} + +END { + sets[1] = "REQUIRED"; + sets[2] = "DISABLED"; + + for (ns in sets) { + s = sets[ns]; + + printf "/*\n"; + printf " * %s features:\n", s; + printf " *\n"; + fstr = ""; + for (i = 0; i < ncapints; i++) { + mask = 0; + for (j = 0; j < 32; j++) { + nfeat = i*32 + j; + feat = feats[nfeat]; + if (feat) { + st = !!featstat[s, feat]; + if (st) { + nfstr = fstr " " feat; + if (length(nfstr) > 72) { + printf " * %s\n", fstr; + nfstr = " " feat; + } + fstr = nfstr; + } + mask += st * (2 ^ j); + } + } + masks[i] = mask; + } + printf " * %s\n */\n\n", fstr; + + for (i = 0; i < ncapints; i++) { + printf "#define %s_MASK%-3d 0x%08x\n", s, i, masks[i]; + } + + printf "#define %s_MASK_CHECK BUILD_BUG_ON_ZERO(NCAPINTS != %d)\n\n", s, ncapints; + } + + printf "#define SSE_MASK\t\\\n"; + printf "\t(REQUIRED_MASK0 & ((1<<(X86_FEATURE_XMM & 31)) | (1<<(X86_FEATURE_XMM2 & 31))))\n\n"; + + printf "#endif /* _ASM_X86_FEATUREMASKS_H */\n"; +} -- 2.45.1