From: Reinette Chatre <reinette.chatre@intel.com>
To: "Luck, Tony" <tony.luck@intel.com>
Cc: Fenghua Yu <fenghuay@nvidia.com>,
"Wieczor-Retman, Maciej" <maciej.wieczor-retman@intel.com>,
Peter Newman <peternewman@google.com>,
James Morse <james.morse@arm.com>,
Babu Moger <babu.moger@amd.com>,
"Drew Fustini" <dfustini@baylibre.com>,
Dave Martin <Dave.Martin@arm.com>,
"Chen, Yu C" <yu.c.chen@intel.com>,
"Box, David E" <david.e.box@intel.com>,
"x86@kernel.org" <x86@kernel.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"patches@lists.linux.dev" <patches@lists.linux.dev>
Subject: Re: [PATCH v4 4/7] fs,x86/resctrl: Add architecture hooks for every mount/unmount
Date: Thu, 23 Apr 2026 16:54:07 -0700 [thread overview]
Message-ID: <f0015e2f-3468-4a31-8eed-c46bc6804ae3@intel.com> (raw)
In-Reply-To: <aeqdOlO3BkKQqSQ9@agluck-desk3>
Hi Tony,
On 4/23/26 3:29 PM, Luck, Tony wrote:
> On Wed, Apr 22, 2026 at 03:10:59PM -0700, Reinette Chatre wrote:
>> Hi Tony,
>>
>> On 4/22/26 2:59 PM, Luck, Tony wrote:
>>>>> Seems OK. But to make sure that events are accessible, architecture will
>>>>> now have to "hold" the pmt_telemetry module regardless of whether
>>>>> resctrl file system is mounted.
>>>>
>>>> Could you please elaborate why this is required? if I understand correctly the
>>>> "hold" on the pmt_telemetry module will be done by itself between the
>>>> intel_pmt_get_regions_by_feature() and intel_pmt_put_feature_group() calls.
>>>
>>> If architecture code runs completely asynchronously to resctrl mount/unmount
>>
>> Since there is shared state that is managed via existing locks I do not see
>> architecture running completely asynchronously to resctrl mount/unmount.
>
> I think I now have a solution without any new locks in the file system
> layer (just a call to resctrl_arch_pre_mount() on every mount and a
> call to resctrl_arch_unmount() if the mount fails, and on unmount).
>
> Testing in progress. Cleanup to follow before posting.
Thank you.
>>
>>> when would it be safe to call intel_pmt_put_feature_group()?
>>
>> I think I am missing something here since I have been assuming all along
>> that intel_pmt_put_feature_group() is and will continue to be called from the
>> new unmount handler.
>
> Correct.
>>
>> Reinette
>
> I'm looking at a more aggressive change to the Kconfig options.
>
> Linus complained[1] that the biggest pain point for new people is getting
> the kernel configured. Extra CONFIG options was his prime focus.
Thank you for pointing this out.
>
> So I'm looking at removing CONFIG_X86_CPU_RESCTRL_INTEL_AET completely and
> just making intel_aet.c included with CONFIG_X86_CPU_RESCTRL.
Sounds reasonable but how the final dependencies would look like is not obvious to me.
Consider for example this removal happening with today's Kconfig that may force
a kernel that will run on AMD/Hygon to be built with INTEL_PMT_TELEMETRY/INTEL_TPMI.
Something like this does not look right.
> It does mean the resctrl will depend on X86_64, killing 32-bit support.
> That was discussed before and decision deferred. But there's other 64-bit MMIO
> stuff in the pipeline that means we have to make this change sooner or later.
>
> Thoughts on unconditional inclusion and on removing 32-bit support?
I believe we already have a clear answer on 32-bit support for resctrl on *x86*
from Thomas https://lore.kernel.org/lkml/87jzm3jckw.ffs@tglx/ and
Babu https://lore.kernel.org/lkml/162f5113-4eb6-dcea-f034-c81b9dc021b6@amd.com/
Whether this can be extended to resctrl fs is not obvious to me but I think this
64-bit requirement is indeed limited to x86 here?
About the unconditional inclusion I would just like to ensure that the
resulting dependencies are reasonable for all x86.
Reinette
>
> -Tony
>
> [1] https://lore.kernel.org/all/CAHk-=whigg3hvOy7c1j1MXFy6o6CHp0g4Tc3Y-MAk+XDssHU0A@mail.gmail.com
next prev parent reply other threads:[~2026-04-23 23:54 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-30 21:43 [PATCH v4 0/7] Allow AET to use PMT/TPMI as loadable modules Tony Luck
2026-03-30 21:43 ` [PATCH v4 1/7] platform/x86/intel/pmt: Export PMT enumeration functions as GPL Tony Luck
2026-04-04 0:00 ` Reinette Chatre
2026-04-06 18:07 ` David Box
2026-04-08 5:07 ` Christoph Hellwig
2026-04-08 17:01 ` Luck, Tony
2026-04-09 5:41 ` Christoph Hellwig
2026-03-30 21:43 ` [PATCH v4 2/7] x86/resctrl: Drop setting of event_group::force_off when insufficient RMIDs Tony Luck
2026-04-04 0:01 ` Reinette Chatre
2026-03-30 21:43 ` [PATCH v4 3/7] fs/resctrl: Add interface to disable a monitor event Tony Luck
2026-04-04 0:03 ` Reinette Chatre
2026-04-06 18:35 ` Luck, Tony
2026-04-06 21:13 ` Reinette Chatre
2026-04-07 18:40 ` Luck, Tony
2026-04-07 23:10 ` Reinette Chatre
2026-03-30 21:43 ` [PATCH v4 4/7] fs,x86/resctrl: Add architecture hooks for every mount/unmount Tony Luck
2026-04-04 0:52 ` Reinette Chatre
2026-04-06 20:35 ` Luck, Tony
2026-04-06 21:16 ` Reinette Chatre
2026-04-09 20:35 ` Luck, Tony
2026-04-10 15:16 ` Reinette Chatre
2026-04-10 18:59 ` Luck, Tony
2026-04-10 21:21 ` Reinette Chatre
2026-04-10 23:03 ` Luck, Tony
2026-04-21 20:25 ` Luck, Tony
2026-04-22 21:28 ` Reinette Chatre
2026-04-22 21:59 ` Luck, Tony
2026-04-22 22:10 ` Reinette Chatre
2026-04-22 22:44 ` Luck, Tony
2026-04-22 23:17 ` Reinette Chatre
2026-04-23 22:29 ` Luck, Tony
2026-04-23 23:54 ` Reinette Chatre [this message]
2026-03-30 21:43 ` [PATCH v4 5/7] x86/resctrl: Resolve PMT and TPMI symbols at runtime Tony Luck
2026-04-04 0:56 ` Reinette Chatre
2026-04-07 18:13 ` Luck, Tony
2026-04-07 18:40 ` Reinette Chatre
2026-04-07 20:33 ` Luck, Tony
2026-03-30 21:43 ` [PATCH v4 6/7] x86/resctrl: Delete intel_aet_exit() Tony Luck
2026-03-30 21:43 ` [PATCH v4 7/7] x86/resctrl: Downgrade dependency of AET on INTEL_PMT Tony Luck
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f0015e2f-3468-4a31-8eed-c46bc6804ae3@intel.com \
--to=reinette.chatre@intel.com \
--cc=Dave.Martin@arm.com \
--cc=babu.moger@amd.com \
--cc=david.e.box@intel.com \
--cc=dfustini@baylibre.com \
--cc=fenghuay@nvidia.com \
--cc=james.morse@arm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=maciej.wieczor-retman@intel.com \
--cc=patches@lists.linux.dev \
--cc=peternewman@google.com \
--cc=tony.luck@intel.com \
--cc=x86@kernel.org \
--cc=yu.c.chen@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox