All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Luck, Tony" <tony.luck@intel.com>
To: Reinette Chatre <reinette.chatre@intel.com>
Cc: Fenghua Yu <fenghuay@nvidia.com>,
	"Wieczor-Retman, Maciej" <maciej.wieczor-retman@intel.com>,
	Peter Newman <peternewman@google.com>,
	James Morse <james.morse@arm.com>,
	Babu Moger <babu.moger@amd.com>,
	"Drew Fustini" <dfustini@baylibre.com>,
	Dave Martin <Dave.Martin@arm.com>,
	"Chen, Yu C" <yu.c.chen@intel.com>,
	"Box, David E" <david.e.box@intel.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"patches@lists.linux.dev" <patches@lists.linux.dev>
Subject: Re: [PATCH v4 4/7] fs,x86/resctrl: Add architecture hooks for every mount/unmount
Date: Fri, 24 Apr 2026 12:09:30 -0700	[thread overview]
Message-ID: <aeu_6i6AGUOe6OvJ@agluck-desk3> (raw)
In-Reply-To: <f0015e2f-3468-4a31-8eed-c46bc6804ae3@intel.com>

On Thu, Apr 23, 2026 at 04:54:07PM -0700, Reinette Chatre wrote:
> Hi Tony,
> 
> On 4/23/26 3:29 PM, Luck, Tony wrote:
> > On Wed, Apr 22, 2026 at 03:10:59PM -0700, Reinette Chatre wrote:
> >> Hi Tony,
> >>
> >> On 4/22/26 2:59 PM, Luck, Tony wrote:
> >>>>> Seems OK. But to make sure that events are accessible, architecture will
> >>>>> now have to "hold" the pmt_telemetry module regardless of whether
> >>>>> resctrl file system is mounted.
> >>>>
> >>>> Could you please elaborate why this is required? if I understand correctly the
> >>>> "hold" on the pmt_telemetry module will be done by itself between the
> >>>> intel_pmt_get_regions_by_feature() and intel_pmt_put_feature_group() calls.
> >>>
> >>> If architecture code runs completely asynchronously to resctrl mount/unmount
> >>
> >> Since there is shared state that is managed via existing locks I do not see
> >> architecture running completely asynchronously to resctrl mount/unmount.
> > 
> > I think I now have a solution without any new locks in the file system
> > layer (just a call to resctrl_arch_pre_mount() on every mount and a
> > call to resctrl_arch_unmount() if the mount fails, and on unmount).
> > 
> > Testing in progress. Cleanup to follow before posting.
> 
> Thank you.
> 
> >>
> >>> when would it be safe to call intel_pmt_put_feature_group()?
> >>
> >> I think I am missing something here since I have been assuming all along
> >> that intel_pmt_put_feature_group() is and will continue to be called from the
> >> new unmount handler.
> > 
> > Correct.
> >>
> >> Reinette
> > 
> > I'm looking at a more aggressive change to the Kconfig options.
> > 
> > Linus complained[1] that the biggest pain point for new people is getting
> > the kernel configured. Extra CONFIG options was his prime focus.
> 
> Thank you for pointing this out.
> 
> > 
> > So I'm looking at removing CONFIG_X86_CPU_RESCTRL_INTEL_AET completely and
> > just making intel_aet.c included with CONFIG_X86_CPU_RESCTRL.
> 
> Sounds reasonable but how the final dependencies would look like is not obvious to me.
> Consider for example this removal happening with today's Kconfig that may force
> a kernel that will run on AMD/Hygon to be built with INTEL_PMT_TELEMETRY/INTEL_TPMI.
> Something like this does not look right.
> 
> > It does mean the resctrl will depend on X86_64, killing 32-bit support.
> > That was discussed before and decision deferred. But there's other 64-bit MMIO
> > stuff in the pipeline that means we have to make this change sooner or later.
> > 
> > Thoughts on unconditional inclusion and on removing 32-bit support?
> 
> I believe we already have a clear answer on 32-bit support for resctrl on *x86*
> from Thomas https://lore.kernel.org/lkml/87jzm3jckw.ffs@tglx/ and
> Babu https://lore.kernel.org/lkml/162f5113-4eb6-dcea-f034-c81b9dc021b6@amd.com/

Good.

> Whether this can be extended to resctrl fs is not obvious to me but I think this
> 64-bit requirement is indeed limited to x86 here? 

Just x86. The specific need is for readq() to do a 64-bit read of an
event counter from MMIO space.

> About the unconditional inclusion I would just like to ensure that the
> resulting dependencies are reasonable for all x86.

Only Intel needs INTEL_PMT_TELEMETRY. I tested out this Kconfig dependency:

	depends on (INTEL_PMT_TELEMETRY != n) || !CPU_SUP_INTEL

and managed to configure X86_CPU_RESCTRL without INTEL_PMT_TELEMETRY for
a configuration that set CPU_SUP_AMD but not CPU_SUP_INTEL in the
"Processor type and features" -> "Supported processor vendors" menu.

Note that your need CONFIG_EXPERT=y to see this option.

> Reinette
> 
> > 
> > -Tony
> > 
> > [1] https://lore.kernel.org/all/CAHk-=whigg3hvOy7c1j1MXFy6o6CHp0g4Tc3Y-MAk+XDssHU0A@mail.gmail.com
> 
-Tony

  reply	other threads:[~2026-04-24 19:09 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-03-30 21:43 [PATCH v4 0/7] Allow AET to use PMT/TPMI as loadable modules Tony Luck
2026-03-30 21:43 ` [PATCH v4 1/7] platform/x86/intel/pmt: Export PMT enumeration functions as GPL Tony Luck
2026-04-04  0:00   ` Reinette Chatre
2026-04-06 18:07     ` David Box
2026-04-08  5:07   ` Christoph Hellwig
2026-04-08 17:01     ` Luck, Tony
2026-04-09  5:41       ` Christoph Hellwig
2026-03-30 21:43 ` [PATCH v4 2/7] x86/resctrl: Drop setting of event_group::force_off when insufficient RMIDs Tony Luck
2026-04-04  0:01   ` Reinette Chatre
2026-03-30 21:43 ` [PATCH v4 3/7] fs/resctrl: Add interface to disable a monitor event Tony Luck
2026-04-04  0:03   ` Reinette Chatre
2026-04-06 18:35     ` Luck, Tony
2026-04-06 21:13       ` Reinette Chatre
2026-04-07 18:40         ` Luck, Tony
2026-04-07 23:10           ` Reinette Chatre
2026-03-30 21:43 ` [PATCH v4 4/7] fs,x86/resctrl: Add architecture hooks for every mount/unmount Tony Luck
2026-04-04  0:52   ` Reinette Chatre
2026-04-06 20:35     ` Luck, Tony
2026-04-06 21:16       ` Reinette Chatre
2026-04-09 20:35         ` Luck, Tony
2026-04-10 15:16           ` Reinette Chatre
2026-04-10 18:59             ` Luck, Tony
2026-04-10 21:21               ` Reinette Chatre
2026-04-10 23:03                 ` Luck, Tony
2026-04-21 20:25                 ` Luck, Tony
2026-04-22 21:28                   ` Reinette Chatre
2026-04-22 21:59                     ` Luck, Tony
2026-04-22 22:10                       ` Reinette Chatre
2026-04-22 22:44                         ` Luck, Tony
2026-04-22 23:17                           ` Reinette Chatre
2026-04-23 22:29                         ` Luck, Tony
2026-04-23 23:54                           ` Reinette Chatre
2026-04-24 19:09                             ` Luck, Tony [this message]
2026-03-30 21:43 ` [PATCH v4 5/7] x86/resctrl: Resolve PMT and TPMI symbols at runtime Tony Luck
2026-04-04  0:56   ` Reinette Chatre
2026-04-07 18:13     ` Luck, Tony
2026-04-07 18:40       ` Reinette Chatre
2026-04-07 20:33         ` Luck, Tony
2026-03-30 21:43 ` [PATCH v4 6/7] x86/resctrl: Delete intel_aet_exit() Tony Luck
2026-03-30 21:43 ` [PATCH v4 7/7] x86/resctrl: Downgrade dependency of AET on INTEL_PMT Tony Luck

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aeu_6i6AGUOe6OvJ@agluck-desk3 \
    --to=tony.luck@intel.com \
    --cc=Dave.Martin@arm.com \
    --cc=babu.moger@amd.com \
    --cc=david.e.box@intel.com \
    --cc=dfustini@baylibre.com \
    --cc=fenghuay@nvidia.com \
    --cc=james.morse@arm.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=maciej.wieczor-retman@intel.com \
    --cc=patches@lists.linux.dev \
    --cc=peternewman@google.com \
    --cc=reinette.chatre@intel.com \
    --cc=x86@kernel.org \
    --cc=yu.c.chen@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.