[PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl

James Morse posted 49 patches 11 months, 1 week ago
There is a newer version of this series
Documentation/arch/x86/index.rst              |    1 -
Documentation/filesystems/index.rst           |    1 +
.../{arch/x86 => filesystems}/resctrl.rst     |    0
MAINTAINERS                                   |    4 +-
arch/Kconfig                                  |    8 +
arch/x86/Kconfig                              |    6 +-
arch/x86/include/asm/resctrl.h                |   43 +-
arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
.../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
arch/x86/kernel/process_32.c                  |    2 +-
arch/x86/kernel/process_64.c                  |    2 +-
fs/Kconfig                                    |    1 +
fs/Makefile                                   |    1 +
fs/resctrl/Kconfig                            |   39 +
fs/resctrl/Makefile                           |    6 +
fs/resctrl/ctrlmondata.c                      |  660 +++
fs/resctrl/internal.h                         |  435 ++
fs/resctrl/monitor.c                          |  933 ++++
fs/resctrl/monitor_trace.h                    |   33 +
fs/resctrl/pseudo_lock.c                      | 1104 +++++
fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
include/linux/resctrl.h                       |  216 +-
include/linux/resctrl_types.h                 |   59 +
29 files changed, 7992 insertions(+), 7263 deletions(-)
rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
create mode 100644 fs/resctrl/Kconfig
create mode 100644 fs/resctrl/Makefile
create mode 100644 fs/resctrl/ctrlmondata.c
create mode 100644 fs/resctrl/internal.h
create mode 100644 fs/resctrl/monitor.c
create mode 100644 fs/resctrl/monitor_trace.h
create mode 100644 fs/resctrl/pseudo_lock.c
create mode 100644 fs/resctrl/rdtgroup.c
create mode 100644 include/linux/resctrl_types.h
[PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months, 1 week ago
Changes since v6?:
 * All the excitement is in patch 37, turns out there are two rmdir() paths
   that don't join up.
The last eight patches are new:
 * The python script has been replaced with the patch that it generates, see
   the bare branch below if you want to regenerate it.
 * There have been comments on the followup to the generated patch, those are
   included here - I suggest they be squashed into the generated patch.
 * This version includes some checkpatch linting from Dave.

---
This series renames functions and moves code around. With the
exception of invalid configurations for the configurable-events, there should
be no changes in behaviour caused by this series. It is now possible for
throttle_mode to report 'undefined', but no known platform will do this.

The driving pattern is to make things like struct rdtgroup private to resctrl.
Features like pseudo-lock aren't going to work on arm64, the ability to disable
it at compile time is added.

After this, I can start posting the MPAM driver to make use of resctrl on arm64.
(What's MPAM? See the cover letter of the first series. [1])

This series is based on v6.14-rc3 and can be retrieved from:
https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
or for those who want to regnerate the patch that moves all the code:
https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare


As ever - bugs welcome,
Thanks,

James

[v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
[v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
[v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
[v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
[v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
[v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
[1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/

Amit Singh Tomar (1):
  x86/resctrl: Remove the limit on the number of CLOSID

Dave Martin (3):
  x86/resctrl: Squelch whitespace anomalies in resctrl core code
  x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
  x86/resctrl: Relax some asm #includes

James Morse (45):
  x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
    monitors
  x86/resctrl: Add a helper to avoid reaching into the arch code
    resource list
  x86/resctrl: Remove fflags from struct rdt_resource
  x86/resctrl: Use schema type to determine how to parse schema values
  x86/resctrl: Use schema type to determine the schema format string
  x86/resctrl: Remove data_width and the tabular format
  x86/resctrl: Add max_bw to struct resctrl_membw
  x86/resctrl: Generate default_ctrl instead of sharing it
  x86/resctrl: Add helper for setting CPU default properties
  x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
  x86/resctrl: Expose resctrl fs's init function to the rest of the
    kernel
  x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
  x86/resctrl: Move resctrl types to a separate header
  x86/resctrl: Add an arch helper to reset one resource
  x86/resctrl: Move monitor exit work to a resctrl exit call
  x86/resctrl: Move monitor init work to a resctrl init call
  x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
  x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
  x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
  x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
  x86/resctrl: Move mba_mbps_default_event init to filesystem code
  x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
  x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
  x86/resctrl: Allow an architecture to disable pseudo lock
  x86/resctrl: Make prefetch_disable_bits belong to the arch code
  x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
  x86/resctrl: Move RFTYPE flags to be managed by resctrl
  x86/resctrl: Handle throttle_mode for SMBA resources
  x86/resctrl: Move get_config_index() to a header
  x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
    callers
  x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
  x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
  x86/resctrl: Drop __init/__exit on assorted symbols
  x86/resctrl: Move is_mba_sc() out of core.c
  x86/resctrl: Add end-marker to the resctrl_event_id enum
  x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
  x86/resctrl: Remove a newline to avoid confusing the code move script
  x86/resctrl: Split trace.h
  fs/resctrl: Add boiler plate for external resctrl code
  x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
  x86,fs/resctrl: Move the resctrl filesystem code to live in
    /fs/resctrl
  x86,fs/resctrl: Remove duplicated trace header files
  fs/resctrl: Remove unnecessary includes
  fs/resctrl: Change internal.h's header guard macros
  x86,fs/resctrl: Move resctrl.rst to live under
    Documentation/filesystems

 Documentation/arch/x86/index.rst              |    1 -
 Documentation/filesystems/index.rst           |    1 +
 .../{arch/x86 => filesystems}/resctrl.rst     |    0
 MAINTAINERS                                   |    4 +-
 arch/Kconfig                                  |    8 +
 arch/x86/Kconfig                              |    6 +-
 arch/x86/include/asm/resctrl.h                |   43 +-
 arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
 arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
 arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
 arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
 arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
 arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
 .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
 arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
 arch/x86/kernel/process_32.c                  |    2 +-
 arch/x86/kernel/process_64.c                  |    2 +-
 fs/Kconfig                                    |    1 +
 fs/Makefile                                   |    1 +
 fs/resctrl/Kconfig                            |   39 +
 fs/resctrl/Makefile                           |    6 +
 fs/resctrl/ctrlmondata.c                      |  660 +++
 fs/resctrl/internal.h                         |  435 ++
 fs/resctrl/monitor.c                          |  933 ++++
 fs/resctrl/monitor_trace.h                    |   33 +
 fs/resctrl/pseudo_lock.c                      | 1104 +++++
 fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
 include/linux/resctrl.h                       |  216 +-
 include/linux/resctrl_types.h                 |   59 +
 29 files changed, 7992 insertions(+), 7263 deletions(-)
 rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
 rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
 create mode 100644 fs/resctrl/Kconfig
 create mode 100644 fs/resctrl/Makefile
 create mode 100644 fs/resctrl/ctrlmondata.c
 create mode 100644 fs/resctrl/internal.h
 create mode 100644 fs/resctrl/monitor.c
 create mode 100644 fs/resctrl/monitor_trace.h
 create mode 100644 fs/resctrl/pseudo_lock.c
 create mode 100644 fs/resctrl/rdtgroup.c
 create mode 100644 include/linux/resctrl_types.h

-- 
2.39.5
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Luck, Tony 11 months, 1 week ago
On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
> Changes since v6?:
>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>    that don't join up.
> The last eight patches are new:
>  * The python script has been replaced with the patch that it generates, see
>    the bare branch below if you want to regenerate it.
>  * There have been comments on the followup to the generated patch, those are
>    included here - I suggest they be squashed into the generated patch.
>  * This version includes some checkpatch linting from Dave.
> 
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
> 
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
> 
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
> 
> This series is based on v6.14-rc3 and can be retrieved from:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
> 
> 
> As ever - bugs welcome,
> Thanks,
> 
> James

Upstream is at -rc5, so it's time to pick what to ask Boris to
apply to tip for the upcoming v6.15 merge window.

There are several open issues for Babu's ABMC series. So it
isn't ready at this time.

Also several against this MPAM series from James ... but IMHO the
first bunch of patches look to be in good shape with a
full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17
(things get murkier in the 20's and maybe more likely to have
issues due to skipping patches that don't have all their tags).

So I applied those patches on top of v6.14-rc5 (all but one applied
automatically, patch 10 had two line "fuzz" due to skipping patch 8).

Resulting kernel builds (with W=1), boots, and passes the tests
in tools/tests/selftests/resctrl.

In the interests of making forward progress, should we ask Boris
to take this subset of the MPAM series?

-Tony
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Reinette Chatre 11 months, 1 week ago

On 3/4/25 1:47 PM, Luck, Tony wrote:
> On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
>> Changes since v6?:
>>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>>    that don't join up.
>> The last eight patches are new:
>>  * The python script has been replaced with the patch that it generates, see
>>    the bare branch below if you want to regenerate it.
>>  * There have been comments on the followup to the generated patch, those are
>>    included here - I suggest they be squashed into the generated patch.
>>  * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events, there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
>>
>>
>> As ever - bugs welcome,
>> Thanks,
>>
>> James
> 
> Upstream is at -rc5, so it's time to pick what to ask Boris to
> apply to tip for the upcoming v6.15 merge window.
> 
> There are several open issues for Babu's ABMC series. So it
> isn't ready at this time.
> 
> Also several against this MPAM series from James ... but IMHO the
> first bunch of patches look to be in good shape with a
> full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17
> (things get murkier in the 20's and maybe more likely to have
> issues due to skipping patches that don't have all their tags).
> 
> So I applied those patches on top of v6.14-rc5 (all but one applied
> automatically, patch 10 had two line "fuzz" due to skipping patch 8).
> 
> Resulting kernel builds (with W=1), boots, and passes the tests
> in tools/tests/selftests/resctrl.
> 
> In the interests of making forward progress, should we ask Boris
> to take this subset of the MPAM series?
> 

Sounds like there may have only been about a five minute window for
clarifying questions about v6 before the door was shut on it.
Since I missed that window by a couple of hours I'll move to 
v7 where the MPAM pressure has so promptly shifted.

I'd be happy to work with Boris and other x86 maintainers on
any mechanism they prefer.

Reinette
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Moger, Babu 11 months, 1 week ago

On 3/5/25 10:35, Reinette Chatre wrote:
> 
> 
> On 3/4/25 1:47 PM, Luck, Tony wrote:
>> On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
>>> Changes since v6?:
>>>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>>>    that don't join up.
>>> The last eight patches are new:
>>>  * The python script has been replaced with the patch that it generates, see
>>>    the bare branch below if you want to regenerate it.
>>>  * There have been comments on the followup to the generated patch, those are
>>>    included here - I suggest they be squashed into the generated patch.
>>>  * This version includes some checkpatch linting from Dave.
>>>
>>> ---
>>> This series renames functions and moves code around. With the
>>> exception of invalid configurations for the configurable-events, there should
>>> be no changes in behaviour caused by this series. It is now possible for
>>> throttle_mode to report 'undefined', but no known platform will do this.
>>>
>>> The driving pattern is to make things like struct rdtgroup private to resctrl.
>>> Features like pseudo-lock aren't going to work on arm64, the ability to disable
>>> it at compile time is added.
>>>
>>> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
>>> (What's MPAM? See the cover letter of the first series. [1])
>>>
>>> This series is based on v6.14-rc3 and can be retrieved from:
>>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
>>> or for those who want to regnerate the patch that moves all the code:
>>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
>>>
>>>
>>> As ever - bugs welcome,
>>> Thanks,
>>>
>>> James
>>
>> Upstream is at -rc5, so it's time to pick what to ask Boris to
>> apply to tip for the upcoming v6.15 merge window.
>>
>> There are several open issues for Babu's ABMC series. So it
>> isn't ready at this time.

I agree. ABMC series is not ready yet.

This series should merge first.  I have tested on couple of AMD systems
and everything looks good. I will respond with Tested-by and reviewed-by.

>>
>> Also several against this MPAM series from James ... but IMHO the
>> first bunch of patches look to be in good shape with a
>> full set of Reviewed-by and Tested-by tags on parts 1-7,9-11,13-17
>> (things get murkier in the 20's and maybe more likely to have
>> issues due to skipping patches that don't have all their tags).
>>
>> So I applied those patches on top of v6.14-rc5 (all but one applied
>> automatically, patch 10 had two line "fuzz" due to skipping patch 8).
>>
>> Resulting kernel builds (with W=1), boots, and passes the tests
>> in tools/tests/selftests/resctrl.
>>
>> In the interests of making forward progress, should we ask Boris
>> to take this subset of the MPAM series?
>>
> 
> Sounds like there may have only been about a five minute window for
> clarifying questions about v6 before the door was shut on it.
> Since I missed that window by a couple of hours I'll move to 
> v7 where the MPAM pressure has so promptly shifted.
> 
> I'd be happy to work with Boris and other x86 maintainers on
> any mechanism they prefer.
> 

Sure. Please go ahead.
-- 
Thanks
Babu Moger
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Moger, Babu 11 months ago

On 2/28/25 13:58, James Morse wrote:
> Changes since v6?:
>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>    that don't join up.
> The last eight patches are new:
>  * The python script has been replaced with the patch that it generates, see
>    the bare branch below if you want to regenerate it.
>  * There have been comments on the followup to the generated patch, those are
>    included here - I suggest they be squashed into the generated patch.
>  * This version includes some checkpatch linting from Dave.
> 
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
> 
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
> 
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
> 
> This series is based on v6.14-rc3 and can be retrieved from:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
> 
> 
> As ever - bugs welcome,
> Thanks,
> 
> James
> 
> [v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
> [v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
> [v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
> [v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
> [v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
> [v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
> [1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/
> 
> Amit Singh Tomar (1):
>   x86/resctrl: Remove the limit on the number of CLOSID
> 
> Dave Martin (3):
>   x86/resctrl: Squelch whitespace anomalies in resctrl core code
>   x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
>   x86/resctrl: Relax some asm #includes
> 
> James Morse (45):
>   x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>     monitors
>   x86/resctrl: Add a helper to avoid reaching into the arch code
>     resource list
>   x86/resctrl: Remove fflags from struct rdt_resource
>   x86/resctrl: Use schema type to determine how to parse schema values
>   x86/resctrl: Use schema type to determine the schema format string
>   x86/resctrl: Remove data_width and the tabular format
>   x86/resctrl: Add max_bw to struct resctrl_membw
>   x86/resctrl: Generate default_ctrl instead of sharing it
>   x86/resctrl: Add helper for setting CPU default properties
>   x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>   x86/resctrl: Expose resctrl fs's init function to the rest of the
>     kernel
>   x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>   x86/resctrl: Move resctrl types to a separate header
>   x86/resctrl: Add an arch helper to reset one resource
>   x86/resctrl: Move monitor exit work to a resctrl exit call
>   x86/resctrl: Move monitor init work to a resctrl init call
>   x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>   x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>   x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>   x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
>   x86/resctrl: Move mba_mbps_default_event init to filesystem code
>   x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>   x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>   x86/resctrl: Allow an architecture to disable pseudo lock
>   x86/resctrl: Make prefetch_disable_bits belong to the arch code
>   x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>   x86/resctrl: Move RFTYPE flags to be managed by resctrl
>   x86/resctrl: Handle throttle_mode for SMBA resources
>   x86/resctrl: Move get_config_index() to a header
>   x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>     callers
>   x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>   x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
>   x86/resctrl: Drop __init/__exit on assorted symbols
>   x86/resctrl: Move is_mba_sc() out of core.c
>   x86/resctrl: Add end-marker to the resctrl_event_id enum
>   x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>   x86/resctrl: Remove a newline to avoid confusing the code move script
>   x86/resctrl: Split trace.h
>   fs/resctrl: Add boiler plate for external resctrl code
>   x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
>   x86,fs/resctrl: Move the resctrl filesystem code to live in
>     /fs/resctrl
>   x86,fs/resctrl: Remove duplicated trace header files
>   fs/resctrl: Remove unnecessary includes
>   fs/resctrl: Change internal.h's header guard macros
>   x86,fs/resctrl: Move resctrl.rst to live under
>     Documentation/filesystems
> 
>  Documentation/arch/x86/index.rst              |    1 -
>  Documentation/filesystems/index.rst           |    1 +
>  .../{arch/x86 => filesystems}/resctrl.rst     |    0
>  MAINTAINERS                                   |    4 +-
>  arch/Kconfig                                  |    8 +
>  arch/x86/Kconfig                              |    6 +-
>  arch/x86/include/asm/resctrl.h                |   43 +-
>  arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>  arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>  arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>  arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>  arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>  arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>  .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>  arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>  arch/x86/kernel/process_32.c                  |    2 +-
>  arch/x86/kernel/process_64.c                  |    2 +-
>  fs/Kconfig                                    |    1 +
>  fs/Makefile                                   |    1 +
>  fs/resctrl/Kconfig                            |   39 +
>  fs/resctrl/Makefile                           |    6 +
>  fs/resctrl/ctrlmondata.c                      |  660 +++
>  fs/resctrl/internal.h                         |  435 ++
>  fs/resctrl/monitor.c                          |  933 ++++
>  fs/resctrl/monitor_trace.h                    |   33 +
>  fs/resctrl/pseudo_lock.c                      | 1104 +++++
>  fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>  include/linux/resctrl.h                       |  216 +-
>  include/linux/resctrl_types.h                 |   59 +
>  29 files changed, 7992 insertions(+), 7263 deletions(-)
>  rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>  rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
>  create mode 100644 fs/resctrl/Kconfig
>  create mode 100644 fs/resctrl/Makefile
>  create mode 100644 fs/resctrl/ctrlmondata.c
>  create mode 100644 fs/resctrl/internal.h
>  create mode 100644 fs/resctrl/monitor.c
>  create mode 100644 fs/resctrl/monitor_trace.h
>  create mode 100644 fs/resctrl/pseudo_lock.c
>  create mode 100644 fs/resctrl/rdtgroup.c
>  create mode 100644 include/linux/resctrl_types.h
> 

Ran tests on couple of AMD systems.  Everything looks good.

Tested-by: Babu Moger <babu.moger@amd.com>
-- 
Thanks
Babu Moger
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months ago
Hi Babu,

On 10/03/2025 14:07, Moger, Babu wrote:
> On 2/28/25 13:58, James Morse wrote:
>> Changes since v6?:
>>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>>    that don't join up.
>> The last eight patches are new:
>>  * The python script has been replaced with the patch that it generates, see
>>    the bare branch below if you want to regenerate it.
>>  * There have been comments on the followup to the generated patch, those are
>>    included here - I suggest they be squashed into the generated patch.
>>  * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events, there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare


> Ran tests on couple of AMD systems.  Everything looks good.
> 
> Tested-by: Babu Moger <babu.moger@amd.com>

Thanks!

James
[PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Amit Singh Tomar 11 months, 1 week ago
Hi James,

Changes since v6?:

>   * All the excitement is in patch 37, turns out there are two rmdir() paths
>     that don't join up.
> The last eight patches are new:
>   * The python script has been replaced with the patch that it generates, see
>     the bare branch below if you want to regenerate it.
>   * There have been comments on the followup to the generated patch, those are
>     included here - I suggest they be squashed into the generated patch.
>   * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:

After rebasing mpam/snapshot/v6.14-rc1 on top of this series, Tested a 
few MPAM controls, including Cache Portion Partitioning and Memory 
Bandwidth Partitioning, on Marvell CN10K ARM64 platform, and It looks good.

For this patch-set:
Tested-by: amitsinght@marvell.com

> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>
> Amit Singh Tomar (1):
>    x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
>    x86/resctrl: Squelch whitespace anomalies in resctrl core code
>    x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
>    x86/resctrl: Relax some asm #includes
>
> James Morse (45):
>    x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>      monitors
>    x86/resctrl: Add a helper to avoid reaching into the arch code
>      resource list
>    x86/resctrl: Remove fflags from struct rdt_resource
>    x86/resctrl: Use schema type to determine how to parse schema values
>    x86/resctrl: Use schema type to determine the schema format string
>    x86/resctrl: Remove data_width and the tabular format
>    x86/resctrl: Add max_bw to struct resctrl_membw
>    x86/resctrl: Generate default_ctrl instead of sharing it
>    x86/resctrl: Add helper for setting CPU default properties
>    x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>    x86/resctrl: Expose resctrl fs's init function to the rest of the
>      kernel
>    x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>    x86/resctrl: Move resctrl types to a separate header
>    x86/resctrl: Add an arch helper to reset one resource
>    x86/resctrl: Move monitor exit work to a resctrl exit call
>    x86/resctrl: Move monitor init work to a resctrl init call
>    x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>    x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>    x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>    x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
>    x86/resctrl: Move mba_mbps_default_event init to filesystem code
>    x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>    x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>    x86/resctrl: Allow an architecture to disable pseudo lock
>    x86/resctrl: Make prefetch_disable_bits belong to the arch code
>    x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>    x86/resctrl: Move RFTYPE flags to be managed by resctrl
>    x86/resctrl: Handle throttle_mode for SMBA resources
>    x86/resctrl: Move get_config_index() to a header
>    x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>      callers
>    x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>    x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
>    x86/resctrl: Drop __init/__exit on assorted symbols
>    x86/resctrl: Move is_mba_sc() out of core.c
>    x86/resctrl: Add end-marker to the resctrl_event_id enum
>    x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>    x86/resctrl: Remove a newline to avoid confusing the code move script
>    x86/resctrl: Split trace.h
>    fs/resctrl: Add boiler plate for external resctrl code
>    x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
>    x86,fs/resctrl: Move the resctrl filesystem code to live in
>      /fs/resctrl
>    x86,fs/resctrl: Remove duplicated trace header files
>    fs/resctrl: Remove unnecessary includes
>    fs/resctrl: Change internal.h's header guard macros
>    x86,fs/resctrl: Move resctrl.rst to live under
>      Documentation/filesystems
>
>   Documentation/arch/x86/index.rst              |    1 -
>   Documentation/filesystems/index.rst           |    1 +
>   .../{arch/x86 => filesystems}/resctrl.rst     |    0
>   MAINTAINERS                                   |    4 +-
>   arch/Kconfig                                  |    8 +
>   arch/x86/Kconfig                              |    6 +-
>   arch/x86/include/asm/resctrl.h                |   43 +-
>   arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>   arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>   arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>   arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>   arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>   arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>   .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>   arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>   arch/x86/kernel/process_32.c                  |    2 +-
>   arch/x86/kernel/process_64.c                  |    2 +-
>   fs/Kconfig                                    |    1 +
>   fs/Makefile                                   |    1 +
>   fs/resctrl/Kconfig                            |   39 +
>   fs/resctrl/Makefile                           |    6 +
>   fs/resctrl/ctrlmondata.c                      |  660 +++
>   fs/resctrl/internal.h                         |  435 ++
>   fs/resctrl/monitor.c                          |  933 ++++
>   fs/resctrl/monitor_trace.h                    |   33 +
>   fs/resctrl/pseudo_lock.c                      | 1104 +++++
>   fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>   include/linux/resctrl.h                       |  216 +-
>   include/linux/resctrl_types.h                 |   59 +
>   29 files changed, 7992 insertions(+), 7263 deletions(-)
>   rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>   rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
>   create mode 100644 fs/resctrl/Kconfig
>   create mode 100644 fs/resctrl/Makefile
>   create mode 100644 fs/resctrl/ctrlmondata.c
>   create mode 100644 fs/resctrl/internal.h
>   create mode 100644 fs/resctrl/monitor.c
>   create mode 100644 fs/resctrl/monitor_trace.h
>   create mode 100644 fs/resctrl/pseudo_lock.c
>   create mode 100644 fs/resctrl/rdtgroup.c
>   create mode 100644 include/linux/resctrl_types.h
>
> -- 
> 2.39.5
>

On 3/1/2025 1:28 AM, James Morse wrote:
> Changes since v6?: * All the excitement is in patch 37, turns out 
> there are two rmdir() paths that don't join up. The last eight patches 
> are new: * The python script has been replaced with the patch that it 
> generates, see the bare branch below
> 
> Changes since v6?:
>   * All the excitement is in patch 37, turns out there are two rmdir() paths
>     that don't join up.
> The last eight patches are new:
>   * The python script has been replaced with the patch that it generates, see
>     the bare branch below if you want to regenerate it.
>   * There have been comments on the followup to the generated patch, those are
>     included here - I suggest they be squashed into the generated patch.
>   * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=>
> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=>
> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=>
> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=>
> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=>
> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=>
> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=>
>
> Amit Singh Tomar (1):
>    x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
>    x86/resctrl: Squelch whitespace anomalies in resctrl core code
>    x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
>    x86/resctrl: Relax some asm #includes
>
> James Morse (45):
>    x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>      monitors
>    x86/resctrl: Add a helper to avoid reaching into the arch code
>      resource list
>    x86/resctrl: Remove fflags from struct rdt_resource
>    x86/resctrl: Use schema type to determine how to parse schema values
>    x86/resctrl: Use schema type to determine the schema format string
>    x86/resctrl: Remove data_width and the tabular format
>    x86/resctrl: Add max_bw to struct resctrl_membw
>    x86/resctrl: Generate default_ctrl instead of sharing it
>    x86/resctrl: Add helper for setting CPU default properties
>    x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>    x86/resctrl: Expose resctrl fs's init function to the rest of the
>      kernel
>    x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>    x86/resctrl: Move resctrl types to a separate header
>    x86/resctrl: Add an arch helper to reset one resource
>    x86/resctrl: Move monitor exit work to a resctrl exit call
>    x86/resctrl: Move monitor init work to a resctrl init call
>    x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>    x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>    x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>    x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
>    x86/resctrl: Move mba_mbps_default_event init to filesystem code
>    x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>    x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>    x86/resctrl: Allow an architecture to disable pseudo lock
>    x86/resctrl: Make prefetch_disable_bits belong to the arch code
>    x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>    x86/resctrl: Move RFTYPE flags to be managed by resctrl
>    x86/resctrl: Handle throttle_mode for SMBA resources
>    x86/resctrl: Move get_config_index() to a header
>    x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>      callers
>    x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>    x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
>    x86/resctrl: Drop __init/__exit on assorted symbols
>    x86/resctrl: Move is_mba_sc() out of core.c
>    x86/resctrl: Add end-marker to the resctrl_event_id enum
>    x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>    x86/resctrl: Remove a newline to avoid confusing the code move script
>    x86/resctrl: Split trace.h
>    fs/resctrl: Add boiler plate for external resctrl code
>    x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
>    x86,fs/resctrl: Move the resctrl filesystem code to live in
>      /fs/resctrl
>    x86,fs/resctrl: Remove duplicated trace header files
>    fs/resctrl: Remove unnecessary includes
>    fs/resctrl: Change internal.h's header guard macros
>    x86,fs/resctrl: Move resctrl.rst to live under
>      Documentation/filesystems
>
>   Documentation/arch/x86/index.rst              |    1 -
>   Documentation/filesystems/index.rst           |    1 +
>   .../{arch/x86 => filesystems}/resctrl.rst     |    0
>   MAINTAINERS                                   |    4 +-
>   arch/Kconfig                                  |    8 +
>   arch/x86/Kconfig                              |    6 +-
>   arch/x86/include/asm/resctrl.h                |   43 +-
>   arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>   arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>   arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>   arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>   arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>   arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>   .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>   arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>   arch/x86/kernel/process_32.c                  |    2 +-
>   arch/x86/kernel/process_64.c                  |    2 +-
>   fs/Kconfig                                    |    1 +
>   fs/Makefile                                   |    1 +
>   fs/resctrl/Kconfig                            |   39 +
>   fs/resctrl/Makefile                           |    6 +
>   fs/resctrl/ctrlmondata.c                      |  660 +++
>   fs/resctrl/internal.h                         |  435 ++
>   fs/resctrl/monitor.c                          |  933 ++++
>   fs/resctrl/monitor_trace.h                    |   33 +
>   fs/resctrl/pseudo_lock.c                      | 1104 +++++
>   fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>   include/linux/resctrl.h                       |  216 +-
>   include/linux/resctrl_types.h                 |   59 +
>   29 files changed, 7992 insertions(+), 7263 deletions(-)
>   rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>   rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
>   create mode 100644 fs/resctrl/Kconfig
>   create mode 100644 fs/resctrl/Makefile
>   create mode 100644 fs/resctrl/ctrlmondata.c
>   create mode 100644 fs/resctrl/internal.h
>   create mode 100644 fs/resctrl/monitor.c
>   create mode 100644 fs/resctrl/monitor_trace.h
>   create mode 100644 fs/resctrl/pseudo_lock.c
>   create mode 100644 fs/resctrl/rdtgroup.c
>   create mode 100644 include/linux/resctrl_types.h
>
> -- 
> 2.39.5
>
[PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Amit Singh Tomar 11 months, 1 week ago
On 3/7/2025 3:57 PM, Amit Singh Tomar wrote:
> Hi James,
>
> Changes since v6?:
>
>>   * All the excitement is in patch 37, turns out there are two 
>> rmdir() paths
>>     that don't join up.
>> The last eight patches are new:
>>   * The python script has been replaced with the patch that it 
>> generates, see
>>     the bare branch below if you want to regenerate it.
>>   * There have been comments on the followup to the generated patch, 
>> those are
>>     included here - I suggest they be squashed into the generated patch.
>>   * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events, 
>> there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to 
>> resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability 
>> to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of 
>> resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> 
>> mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>
> After rebasing mpam/snapshot/v6.14-rc1 on top of this series, Tested a 
> few MPAM controls, including Cache Portion Partitioning and Memory 
> Bandwidth Partitioning, on Marvell CN10K ARM64 platform, and It looks 
> good.
>
> For this patch-set:
> Tested-by: amitsinght@marvell.com
Realized I used an incorrect format for the Tested-by tag, correcting it now

Tested-by: Amit Singh Tomar <amitsinght@marvell.com>

>
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> 
>> mpam/move_to_fs/v7_bare
>>
>>
>> As ever - bugs welcome,
>> Thanks,
>>
>> James
>>
>> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=> 
>>
>> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=> 
>>
>> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=> 
>>
>> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=> 
>>
>> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=> 
>>
>> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=> 
>>
>> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=> 
>>
>>
>> Amit Singh Tomar (1):
>>    x86/resctrl: Remove the limit on the number of CLOSID
>>
>> Dave Martin (3):
>>    x86/resctrl: Squelch whitespace anomalies in resctrl core code
>>    x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in 
>> rdt_init_fs_context()
>>    x86/resctrl: Relax some asm #includes
>>
>> James Morse (45):
>>    x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>>      monitors
>>    x86/resctrl: Add a helper to avoid reaching into the arch code
>>      resource list
>>    x86/resctrl: Remove fflags from struct rdt_resource
>>    x86/resctrl: Use schema type to determine how to parse schema values
>>    x86/resctrl: Use schema type to determine the schema format string
>>    x86/resctrl: Remove data_width and the tabular format
>>    x86/resctrl: Add max_bw to struct resctrl_membw
>>    x86/resctrl: Generate default_ctrl instead of sharing it
>>    x86/resctrl: Add helper for setting CPU default properties
>>    x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>>    x86/resctrl: Expose resctrl fs's init function to the rest of the
>>      kernel
>>    x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>>    x86/resctrl: Move resctrl types to a separate header
>>    x86/resctrl: Add an arch helper to reset one resource
>>    x86/resctrl: Move monitor exit work to a resctrl exit call
>>    x86/resctrl: Move monitor init work to a resctrl init call
>>    x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>>    x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>>    x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>>    x86/resctrl: Change mon_event_config_{read,write}() to be arch 
>> helpers
>>    x86/resctrl: Move mba_mbps_default_event init to filesystem code
>>    x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>>    x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>>    x86/resctrl: Allow an architecture to disable pseudo lock
>>    x86/resctrl: Make prefetch_disable_bits belong to the arch code
>>    x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>>    x86/resctrl: Move RFTYPE flags to be managed by resctrl
>>    x86/resctrl: Handle throttle_mode for SMBA resources
>>    x86/resctrl: Move get_config_index() to a header
>>    x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>>      callers
>>    x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>>    x86/resctrl: resctrl_exit() teardown resctrl but leave the mount 
>> point
>>    x86/resctrl: Drop __init/__exit on assorted symbols
>>    x86/resctrl: Move is_mba_sc() out of core.c
>>    x86/resctrl: Add end-marker to the resctrl_event_id enum
>>    x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>>    x86/resctrl: Remove a newline to avoid confusing the code move script
>>    x86/resctrl: Split trace.h
>>    fs/resctrl: Add boiler plate for external resctrl code
>>    x86/resctrl: Move the filesystem bits to headers visible to 
>> fs/resctrl
>>    x86,fs/resctrl: Move the resctrl filesystem code to live in
>>      /fs/resctrl
>>    x86,fs/resctrl: Remove duplicated trace header files
>>    fs/resctrl: Remove unnecessary includes
>>    fs/resctrl: Change internal.h's header guard macros
>>    x86,fs/resctrl: Move resctrl.rst to live under
>>      Documentation/filesystems
>>
>>   Documentation/arch/x86/index.rst              |    1 -
>>   Documentation/filesystems/index.rst           |    1 +
>>   .../{arch/x86 => filesystems}/resctrl.rst     |    0
>>   MAINTAINERS                                   |    4 +-
>>   arch/Kconfig                                  |    8 +
>>   arch/x86/Kconfig                              |    6 +-
>>   arch/x86/include/asm/resctrl.h                |   43 +-
>>   arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>>   arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>>   arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>>   arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>>   arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>>   arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>>   .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>>   arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>>   arch/x86/kernel/process_32.c                  |    2 +-
>>   arch/x86/kernel/process_64.c                  |    2 +-
>>   fs/Kconfig                                    |    1 +
>>   fs/Makefile                                   |    1 +
>>   fs/resctrl/Kconfig                            |   39 +
>>   fs/resctrl/Makefile                           |    6 +
>>   fs/resctrl/ctrlmondata.c                      |  660 +++
>>   fs/resctrl/internal.h                         |  435 ++
>>   fs/resctrl/monitor.c                          |  933 ++++
>>   fs/resctrl/monitor_trace.h                    |   33 +
>>   fs/resctrl/pseudo_lock.c                      | 1104 +++++
>>   fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>>   include/linux/resctrl.h                       |  216 +-
>>   include/linux/resctrl_types.h                 |   59 +
>>   29 files changed, 7992 insertions(+), 7263 deletions(-)
>>   rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>>   rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} 
>> (56%)
>>   create mode 100644 fs/resctrl/Kconfig
>>   create mode 100644 fs/resctrl/Makefile
>>   create mode 100644 fs/resctrl/ctrlmondata.c
>>   create mode 100644 fs/resctrl/internal.h
>>   create mode 100644 fs/resctrl/monitor.c
>>   create mode 100644 fs/resctrl/monitor_trace.h
>>   create mode 100644 fs/resctrl/pseudo_lock.c
>>   create mode 100644 fs/resctrl/rdtgroup.c
>>   create mode 100644 include/linux/resctrl_types.h
>>
>> -- 
>> 2.39.5
>>
>
> On 3/1/2025 1:28 AM, James Morse wrote:
>> Changes since v6?: * All the excitement is in patch 37, turns out 
>> there are two rmdir() paths that don't join up. The last eight 
>> patches are new: * The python script has been replaced with the patch 
>> that it generates, see the bare branch below
>> 
>> Changes since v6?:
>>   * All the excitement is in patch 37, turns out there are two 
>> rmdir() paths
>>     that don't join up.
>> The last eight patches are new:
>>   * The python script has been replaced with the patch that it 
>> generates, see
>>     the bare branch below if you want to regenerate it.
>>   * There have been comments on the followup to the generated patch, 
>> those are
>>     included here - I suggest they be squashed into the generated patch.
>>   * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events, 
>> there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to 
>> resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability 
>> to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of 
>> resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> 
>> mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> 
>> mpam/move_to_fs/v7_bare
>>
>>
>> As ever - bugs welcome,
>> Thanks,
>>
>> James
>>
>> [v6]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20250207181823.6378-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=Giw7Cw-bCKcY06OE4h_CYGNmKoeW3Rnf9Ph433fTflg&e=> 
>>
>> [v5]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20241004180347.19985-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=NuPo6XsrzJWgoWgnhpf5PxXdFEozS_Zgk_XBTnhAn6k&e=> 
>>
>> [v4]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_all_20240802172853.22529-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=x0enrBNorLUBSyhg_SOJl9itXA4Ht_65SifVAOpMEO4&e=> 
>>
>> [v3]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240614150033.10454-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=FPG_ZTHC69sPw7sz4QOvpKZ76X7VQSTuO2yN67LY4VI&e=> 
>>
>> [v2]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240426150537.8094-2D1-2DDave.Martin-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=C--gCozXx-zNwx631Snz1h6SShLrm546dr0_ISKSC9A&e=> 
>>
>> [v1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_r_20240321165106.31602-2D1-2Djames.morse-40arm.com&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=0PJ7kJsoRhwOqCcYwUYrJwbRM9zTssWuhqkgaqXdPNY&e=> 
>>
>> [1]https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e= 
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__lore.kernel.org_lkml_20201030161120.227225-2D1-2Djames.morse-40arm.com_&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=sYrXz5z6dOOGmy5Xjm0lsmdUCAN25SnhDjyq_hUSYi4&e=> 
>>
>>
>> Amit Singh Tomar (1):
>>    x86/resctrl: Remove the limit on the number of CLOSID
>>
>> Dave Martin (3):
>>    x86/resctrl: Squelch whitespace anomalies in resctrl core code
>>    x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in 
>> rdt_init_fs_context()
>>    x86/resctrl: Relax some asm #includes
>>
>> James Morse (45):
>>    x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>>      monitors
>>    x86/resctrl: Add a helper to avoid reaching into the arch code
>>      resource list
>>    x86/resctrl: Remove fflags from struct rdt_resource
>>    x86/resctrl: Use schema type to determine how to parse schema values
>>    x86/resctrl: Use schema type to determine the schema format string
>>    x86/resctrl: Remove data_width and the tabular format
>>    x86/resctrl: Add max_bw to struct resctrl_membw
>>    x86/resctrl: Generate default_ctrl instead of sharing it
>>    x86/resctrl: Add helper for setting CPU default properties
>>    x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>>    x86/resctrl: Expose resctrl fs's init function to the rest of the
>>      kernel
>>    x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>>    x86/resctrl: Move resctrl types to a separate header
>>    x86/resctrl: Add an arch helper to reset one resource
>>    x86/resctrl: Move monitor exit work to a resctrl exit call
>>    x86/resctrl: Move monitor init work to a resctrl init call
>>    x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>>    x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>>    x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>>    x86/resctrl: Change mon_event_config_{read,write}() to be arch 
>> helpers
>>    x86/resctrl: Move mba_mbps_default_event init to filesystem code
>>    x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>>    x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>>    x86/resctrl: Allow an architecture to disable pseudo lock
>>    x86/resctrl: Make prefetch_disable_bits belong to the arch code
>>    x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>>    x86/resctrl: Move RFTYPE flags to be managed by resctrl
>>    x86/resctrl: Handle throttle_mode for SMBA resources
>>    x86/resctrl: Move get_config_index() to a header
>>    x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>>      callers
>>    x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>>    x86/resctrl: resctrl_exit() teardown resctrl but leave the mount 
>> point
>>    x86/resctrl: Drop __init/__exit on assorted symbols
>>    x86/resctrl: Move is_mba_sc() out of core.c
>>    x86/resctrl: Add end-marker to the resctrl_event_id enum
>>    x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>>    x86/resctrl: Remove a newline to avoid confusing the code move script
>>    x86/resctrl: Split trace.h
>>    fs/resctrl: Add boiler plate for external resctrl code
>>    x86/resctrl: Move the filesystem bits to headers visible to 
>> fs/resctrl
>>    x86,fs/resctrl: Move the resctrl filesystem code to live in
>>      /fs/resctrl
>>    x86,fs/resctrl: Remove duplicated trace header files
>>    fs/resctrl: Remove unnecessary includes
>>    fs/resctrl: Change internal.h's header guard macros
>>    x86,fs/resctrl: Move resctrl.rst to live under
>>      Documentation/filesystems
>>
>>   Documentation/arch/x86/index.rst              |    1 -
>>   Documentation/filesystems/index.rst           |    1 +
>>   .../{arch/x86 => filesystems}/resctrl.rst     |    0
>>   MAINTAINERS                                   |    4 +-
>>   arch/Kconfig                                  |    8 +
>>   arch/x86/Kconfig                              |    6 +-
>>   arch/x86/include/asm/resctrl.h                |   43 +-
>>   arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>>   arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>>   arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>>   arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>>   arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>>   arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>>   .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>>   arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>>   arch/x86/kernel/process_32.c                  |    2 +-
>>   arch/x86/kernel/process_64.c                  |    2 +-
>>   fs/Kconfig                                    |    1 +
>>   fs/Makefile                                   |    1 +
>>   fs/resctrl/Kconfig                            |   39 +
>>   fs/resctrl/Makefile                           |    6 +
>>   fs/resctrl/ctrlmondata.c                      |  660 +++
>>   fs/resctrl/internal.h                         |  435 ++
>>   fs/resctrl/monitor.c                          |  933 ++++
>>   fs/resctrl/monitor_trace.h                    |   33 +
>>   fs/resctrl/pseudo_lock.c                      | 1104 +++++
>>   fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>>   include/linux/resctrl.h                       |  216 +-
>>   include/linux/resctrl_types.h                 |   59 +
>>   29 files changed, 7992 insertions(+), 7263 deletions(-)
>>   rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>>   rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} 
>> (56%)
>>   create mode 100644 fs/resctrl/Kconfig
>>   create mode 100644 fs/resctrl/Makefile
>>   create mode 100644 fs/resctrl/ctrlmondata.c
>>   create mode 100644 fs/resctrl/internal.h
>>   create mode 100644 fs/resctrl/monitor.c
>>   create mode 100644 fs/resctrl/monitor_trace.h
>>   create mode 100644 fs/resctrl/pseudo_lock.c
>>   create mode 100644 fs/resctrl/rdtgroup.c
>>   create mode 100644 include/linux/resctrl_types.h
>>
>> -- 
>> 2.39.5
>>
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months ago
Hi Amit,

On 07/03/2025 13:50, Amit Singh Tomar wrote:
> On 3/7/2025 3:57 PM, Amit Singh Tomar wrote:
>> Changes since v6?:
>>
>>>   * All the excitement is in patch 37, turns out there are two rmdir() paths
>>>     that don't join up.
>>> The last eight patches are new:
>>>   * The python script has been replaced with the patch that it generates, see
>>>     the bare branch below if you want to regenerate it.
>>>   * There have been comments on the followup to the generated patch, those are
>>>     included here - I suggest they be squashed into the generated patch.
>>>   * This version includes some checkpatch linting from Dave.
>>>
>>> ---
>>> This series renames functions and moves code around. With the
>>> exception of invalid configurations for the configurable-events, there should
>>> be no changes in behaviour caused by this series. It is now possible for
>>> throttle_mode to report 'undefined', but no known platform will do this.
>>>
>>> The driving pattern is to make things like struct rdtgroup private to resctrl.
>>> Features like pseudo-lock aren't going to work on arm64, the ability to disable
>>> it at compile time is added.
>>>
>>> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
>>> (What's MPAM? See the cover letter of the first series. [1])
>>>
>>> This series is based on v6.14-rc3 and can be retrieved from:
>>> https://urldefense.proofpoint.com/v2/url?
>>> u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__git.kernel.org_pub_scm_linux_kernel_git_morse_linux.git&d=DwIDAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=V_GK7jRuCHDErm6txmgDK1-MbUihtnSQ3gPgB-A-JKU&m=nuwqirfPj-0yJqyDZfy25skE_NJ-fYFcygpI04RUICnSUBYHutdqE6Gakd1Z3I8H&s=34Q-cAJD41LWUgU21FvoSkXHOM-uSrOs2a1vEwaxrNE&e=> mpam/move_to_fs/v7
>>> or for those who want to regnerate the patch that moves all the code:
>>
>> After rebasing mpam/snapshot/v6.14-rc1 on top of this series,

Hmmm - right, because this series doesn't contain the python script that generates
patch-45, so git can't know that all the code is the same.


>> Tested a few MPAM
>> controls, including Cache Portion Partitioning and Memory Bandwidth Partitioning, on
>> Marvell CN10K ARM64 platform, and It looks good.

Thanks!


>> For this patch-set:
>> Tested-by: amitsinght@marvell.com
> Realized I used an incorrect format for the Tested-by tag, correcting it now
> 
> Tested-by: Amit Singh Tomar <amitsinght@marvell.com>

I'll add an '# arm64' suffix on that as that's what got tested.


Thanks,

Jaems
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Shanker Donthineni 11 months ago
Hi James,

I have tested this patch series w/o MPAM patches on the Grace server platform.
Validated both the features CPOR and MBW, results as expected.

Tested-by: Shanker Donthineni <sdonthineni@nvidia.com>


-Shanker
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Shanker Donthineni 11 months ago
Typo, tested with MPAM patches.

On 3/7/25 10:38, Shanker Donthineni wrote:
> 
> Hi James,
> 
> I have tested this patch series w/ MPAM patches on the Grace server platform.
> Validated both the features CPOR and MBW, results as expected.
> 
> Tested-by: Shanker Donthineni <sdonthineni@nvidia.com>
> 
> 
> -Shanker
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months ago
Hi Shanker,

On 07/03/2025 16:50, Shanker Donthineni wrote:
> On 3/7/25 10:38, Shanker Donthineni wrote:
>> I have tested this patch series w/ MPAM patches on the Grace server platform.
>> Validated both the features CPOR and MBW, results as expected.

> Typo, tested with MPAM patches.

>> Tested-by: Shanker Donthineni <sdonthineni@nvidia.com>


Thanks! (as noted elsewhere - I've added an '# arm64' suffix to this)

James
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Borislav Petkov 11 months ago
On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
> Changes since v6?:
>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>    that don't join up.
> The last eight patches are new:
>  * The python script has been replaced with the patch that it generates, see
>    the bare branch below if you want to regenerate it.
>  * There have been comments on the followup to the generated patch, those are
>    included here - I suggest they be squashed into the generated patch.
>  * This version includes some checkpatch linting from Dave.

So, Reinette says that 1-30 should be ready to go. Care to send them ASAP with
all the review feedback addressed so that I can try to queue them, we all test
the branch this week and thus I can empty a considerable amount out of your
bucket of patches...

Thx.

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months ago
Hi Boris,

On 10/03/2025 19:09, Borislav Petkov wrote:
> On Fri, Feb 28, 2025 at 07:58:24PM +0000, James Morse wrote:
>> Changes since v6?:
>>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>>    that don't join up.
>> The last eight patches are new:
>>  * The python script has been replaced with the patch that it generates, see
>>    the bare branch below if you want to regenerate it.
>>  * There have been comments on the followup to the generated patch, those are
>>    included here - I suggest they be squashed into the generated patch.
>>  * This version includes some checkpatch linting from Dave.
> 
> So, Reinette says that 1-30 should be ready to go. Care to send them ASAP with
> all the review feedback addressed so that I can try to queue them,

Thanks - look out for a 'v8:for_boris'.


> we all test
> the branch this week and thus I can empty a considerable amount out of your
> bucket of patches...


Thanks!

James
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Borislav Petkov 11 months ago
On Tue, Mar 11, 2025 at 06:38:44PM +0000, James Morse wrote:
> Thanks - look out for a 'v8:for_boris'.

Got it, working through it slowly.

Thx!

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by Peter Newman 11 months, 1 week ago
Hi James,

On Fri, Feb 28, 2025 at 8:59 PM James Morse <james.morse@arm.com> wrote:
>
> Changes since v6?:
>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>    that don't join up.
> The last eight patches are new:
>  * The python script has been replaced with the patch that it generates, see
>    the bare branch below if you want to regenerate it.
>  * There have been comments on the followup to the generated patch, those are
>    included here - I suggest they be squashed into the generated patch.
>  * This version includes some checkpatch linting from Dave.
>
> ---
> This series renames functions and moves code around. With the
> exception of invalid configurations for the configurable-events, there should
> be no changes in behaviour caused by this series. It is now possible for
> throttle_mode to report 'undefined', but no known platform will do this.
>
> The driving pattern is to make things like struct rdtgroup private to resctrl.
> Features like pseudo-lock aren't going to work on arm64, the ability to disable
> it at compile time is added.
>
> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
> (What's MPAM? See the cover letter of the first series. [1])
>
> This series is based on v6.14-rc3 and can be retrieved from:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
> or for those who want to regnerate the patch that moves all the code:
> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare
>
>
> As ever - bugs welcome,
> Thanks,
>
> James
>
> [v6] https://lore.kernel.org/lkml/20250207181823.6378-1-james.morse@arm.com/
> [v5] https://lore.kernel.org/r/20241004180347.19985-1-james.morse@arm.com
> [v4] https://lore.kernel.org/all/20240802172853.22529-1-james.morse@arm.com/
> [v3] https://lore.kernel.org/r/20240614150033.10454-1-james.morse@arm.com
> [v2] https://lore.kernel.org/r/20240426150537.8094-1-Dave.Martin@arm.com
> [v1] https://lore.kernel.org/r/20240321165106.31602-1-james.morse@arm.com
> [1] https://lore.kernel.org/lkml/20201030161120.227225-1-james.morse@arm.com/
>
> Amit Singh Tomar (1):
>   x86/resctrl: Remove the limit on the number of CLOSID
>
> Dave Martin (3):
>   x86/resctrl: Squelch whitespace anomalies in resctrl core code
>   x86/resctrl: Prefer alloc(sizeof(*foo)) idiom in rdt_init_fs_context()
>   x86/resctrl: Relax some asm #includes
>
> James Morse (45):
>   x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no
>     monitors
>   x86/resctrl: Add a helper to avoid reaching into the arch code
>     resource list
>   x86/resctrl: Remove fflags from struct rdt_resource
>   x86/resctrl: Use schema type to determine how to parse schema values
>   x86/resctrl: Use schema type to determine the schema format string
>   x86/resctrl: Remove data_width and the tabular format
>   x86/resctrl: Add max_bw to struct resctrl_membw
>   x86/resctrl: Generate default_ctrl instead of sharing it
>   x86/resctrl: Add helper for setting CPU default properties
>   x86/resctrl: Remove rdtgroup from update_cpu_closid_rmid()
>   x86/resctrl: Expose resctrl fs's init function to the rest of the
>     kernel
>   x86/resctrl: Move rdt_find_domain() to be visible to arch and fs code
>   x86/resctrl: Move resctrl types to a separate header
>   x86/resctrl: Add an arch helper to reset one resource
>   x86/resctrl: Move monitor exit work to a resctrl exit call
>   x86/resctrl: Move monitor init work to a resctrl init call
>   x86/resctrl: Rewrite and move the for_each_*_rdt_resource() walkers
>   x86/resctrl: Move the is_mbm_*_enabled() helpers to asm/resctrl.h
>   x86/resctrl: Add resctrl_arch_is_evt_configurable() to abstract BMEC
>   x86/resctrl: Change mon_event_config_{read,write}() to be arch helpers
>   x86/resctrl: Move mba_mbps_default_event init to filesystem code
>   x86/resctrl: Move mbm_cfg_mask to struct rdt_resource
>   x86/resctrl: Add resctrl_arch_ prefix to pseudo lock functions
>   x86/resctrl: Allow an architecture to disable pseudo lock
>   x86/resctrl: Make prefetch_disable_bits belong to the arch code
>   x86/resctrl: Make resctrl_arch_pseudo_lock_fn() take a plr
>   x86/resctrl: Move RFTYPE flags to be managed by resctrl
>   x86/resctrl: Handle throttle_mode for SMBA resources
>   x86/resctrl: Move get_config_index() to a header
>   x86/resctrl: Move get_{mon,ctrl}_domain_from_cpu() to live with their
>     callers
>   x86/resctrl: Rename resctrl_sched_in() to begin with "resctrl_arch_"
>   x86/resctrl: resctrl_exit() teardown resctrl but leave the mount point
>   x86/resctrl: Drop __init/__exit on assorted symbols
>   x86/resctrl: Move is_mba_sc() out of core.c
>   x86/resctrl: Add end-marker to the resctrl_event_id enum
>   x86/resctrl: Expand the width of dom_id by replacing mon_data_bits
>   x86/resctrl: Remove a newline to avoid confusing the code move script
>   x86/resctrl: Split trace.h
>   fs/resctrl: Add boiler plate for external resctrl code
>   x86/resctrl: Move the filesystem bits to headers visible to fs/resctrl
>   x86,fs/resctrl: Move the resctrl filesystem code to live in
>     /fs/resctrl
>   x86,fs/resctrl: Remove duplicated trace header files
>   fs/resctrl: Remove unnecessary includes
>   fs/resctrl: Change internal.h's header guard macros
>   x86,fs/resctrl: Move resctrl.rst to live under
>     Documentation/filesystems
>
>  Documentation/arch/x86/index.rst              |    1 -
>  Documentation/filesystems/index.rst           |    1 +
>  .../{arch/x86 => filesystems}/resctrl.rst     |    0
>  MAINTAINERS                                   |    4 +-
>  arch/Kconfig                                  |    8 +
>  arch/x86/Kconfig                              |    6 +-
>  arch/x86/include/asm/resctrl.h                |   43 +-
>  arch/x86/kernel/cpu/resctrl/Makefile          |    8 +-
>  arch/x86/kernel/cpu/resctrl/core.c            |  214 +-
>  arch/x86/kernel/cpu/resctrl/ctrlmondata.c     |  606 +--
>  arch/x86/kernel/cpu/resctrl/internal.h        |  504 +-
>  arch/x86/kernel/cpu/resctrl/monitor.c         |  863 +---
>  arch/x86/kernel/cpu/resctrl/pseudo_lock.c     | 1120 +----
>  .../resctrl/{trace.h => pseudo_lock_trace.h}  |   26 +-
>  arch/x86/kernel/cpu/resctrl/rdtgroup.c        | 4031 +--------------
>  arch/x86/kernel/process_32.c                  |    2 +-
>  arch/x86/kernel/process_64.c                  |    2 +-
>  fs/Kconfig                                    |    1 +
>  fs/Makefile                                   |    1 +
>  fs/resctrl/Kconfig                            |   39 +
>  fs/resctrl/Makefile                           |    6 +
>  fs/resctrl/ctrlmondata.c                      |  660 +++
>  fs/resctrl/internal.h                         |  435 ++
>  fs/resctrl/monitor.c                          |  933 ++++
>  fs/resctrl/monitor_trace.h                    |   33 +
>  fs/resctrl/pseudo_lock.c                      | 1104 +++++
>  fs/resctrl/rdtgroup.c                         | 4329 +++++++++++++++++
>  include/linux/resctrl.h                       |  216 +-
>  include/linux/resctrl_types.h                 |   59 +
>  29 files changed, 7992 insertions(+), 7263 deletions(-)
>  rename Documentation/{arch/x86 => filesystems}/resctrl.rst (100%)
>  rename arch/x86/kernel/cpu/resctrl/{trace.h => pseudo_lock_trace.h} (56%)
>  create mode 100644 fs/resctrl/Kconfig
>  create mode 100644 fs/resctrl/Makefile
>  create mode 100644 fs/resctrl/ctrlmondata.c
>  create mode 100644 fs/resctrl/internal.h
>  create mode 100644 fs/resctrl/monitor.c
>  create mode 100644 fs/resctrl/monitor_trace.h
>  create mode 100644 fs/resctrl/pseudo_lock.c
>  create mode 100644 fs/resctrl/rdtgroup.c
>  create mode 100644 include/linux/resctrl_types.h
>
> --
> 2.39.5
>

I applied the series successfully and ran through my usual assortment
of container management-oriented testcases on the following
implementations:

* AMD EPYC 7B12 64-Core Processor
* Intel(R) Xeon(R) Gold 6268CL CPU @ 2.80GHz

Everything looked good.

Tested-by: Peter Newman <peternewman@google.com>

Thanks!
-Peter
Re: [PATCH v7 00/49] x86/resctrl: Move the resctrl filesystem code to /fs/resctrl
Posted by James Morse 11 months ago
Hi Peter,

On 03/03/2025 10:14, Peter Newman wrote:
> On Fri, Feb 28, 2025 at 8:59 PM James Morse <james.morse@arm.com> wrote:
>>
>> Changes since v6?:
>>  * All the excitement is in patch 37, turns out there are two rmdir() paths
>>    that don't join up.
>> The last eight patches are new:
>>  * The python script has been replaced with the patch that it generates, see
>>    the bare branch below if you want to regenerate it.
>>  * There have been comments on the followup to the generated patch, those are
>>    included here - I suggest they be squashed into the generated patch.
>>  * This version includes some checkpatch linting from Dave.
>>
>> ---
>> This series renames functions and moves code around. With the
>> exception of invalid configurations for the configurable-events, there should
>> be no changes in behaviour caused by this series. It is now possible for
>> throttle_mode to report 'undefined', but no known platform will do this.
>>
>> The driving pattern is to make things like struct rdtgroup private to resctrl.
>> Features like pseudo-lock aren't going to work on arm64, the ability to disable
>> it at compile time is added.
>>
>> After this, I can start posting the MPAM driver to make use of resctrl on arm64.
>> (What's MPAM? See the cover letter of the first series. [1])
>>
>> This series is based on v6.14-rc3 and can be retrieved from:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7
>> or for those who want to regnerate the patch that moves all the code:
>> https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git mpam/move_to_fs/v7_bare

> I applied the series successfully and ran through my usual assortment
> of container management-oriented testcases on the following
> implementations:

> * AMD EPYC 7B12 64-Core Processor

Great! This is something I've not managed to get my hands on.


> * Intel(R) Xeon(R) Gold 6268CL CPU @ 2.80GHz
> 
> Everything looked good.
> 
> Tested-by: Peter Newman <peternewman@google.com>

Thanks!

James