From patchwork Tue Dec 20 06:36:58 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Li, Xin3" X-Patchwork-Id: 34944 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:e747:0:0:0:0:0 with SMTP id c7csp2821124wrn; Mon, 19 Dec 2022 23:26:14 -0800 (PST) X-Google-Smtp-Source: AMrXdXuzRTuqO5i0YC+PkcCvXUaqXeb79kZSyPT0Aa+v3zDX46hm+LhSbJJPsWQKJPyC+HxSYmTS X-Received: by 2002:a17:907:104b:b0:7c0:ee31:d8df with SMTP id oy11-20020a170907104b00b007c0ee31d8dfmr958482ejb.63.1671521174291; Mon, 19 Dec 2022 23:26:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671521174; cv=none; d=google.com; s=arc-20160816; b=BQsTifUbTZX4NMW3wrbVT/0o1Huzu/WUt7TdzPaZN5ew22NYHseoSivr9vBSQ+p6KZ 2gl6GOAFVpioIq+8nI3iLEcMDB52HFSFkjXC4i41npBQOSbH85Vmh+JkeWb7ugP+o/Zf 0MGzvkhpheOlx9GmWIgKF8psgDmQsGki1y15ydi4XR9PE4NAHQxbOs9Mer/p255bwGDK P//8o2073EsXN/Mm7fQiYFKw29ALkCApUllwNAmO3qpdDh28xmmdQGpXB+tvhSYObrgw 1NCya+k+CJWFippcWqxBfAPktmf/kE2Yp96J4E0xA/L9/4KYDxy2ITaM82dtXP1kxTCB HrWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=jyechudPjcDRgraXFwScJul3Fz3xhvt/Dj31e1KFmVk=; b=QrhwIo6b8x2mlTKGW1BnYAe8p7mC09JfMwLUj2L+UoCK/MxzFXlYEMEWNAjjpfYwsJ euVglaNXDlMM18J12owBVALU8Dqgfv7YHPLYq7xSsQ9y2NTdxhe0Skux3xQ+JN2tAM9x ygsf8ubaEfhFhf2UT95m3zNJ73MzxfgOqsyw5beIFnhT5r8COy0f1F/1OMNozPx9saRT VZ5Xz+PBqMKrycMT+YQ256niwnMOrVdOP0jLyZu2OwM41xW0iqzklMFt4IY6tS8ajYQf x8vTk4ssYm+H1dfaN1O7cgLuIJv2BDKXEPBek9eIuiTex08iR9kHSSZXj1HgtgJjFtz3 AZBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JZkPLpFG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ji12-20020a170907980c00b007c365fad0basi12178616ejc.152.2022.12.19.23.25.50; Mon, 19 Dec 2022 23:26:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JZkPLpFG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233389AbiLTHEY (ORCPT + 99 others); Tue, 20 Dec 2022 02:04:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53570 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233311AbiLTHBo (ORCPT ); Tue, 20 Dec 2022 02:01:44 -0500 Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 661B0164B3; Mon, 19 Dec 2022 23:01:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671519703; x=1703055703; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=dG+PmrxecS8Zp0V+8AcHi6OKB+U1bLaxzvtp836DcuY=; b=JZkPLpFGoEmHdbTgHrNgwx1CUPms/OqPSC8Xihf6b/8ZGC1BwZ/L4dnV wQpyDnwJ1vSVnsNMmjJl7WpHWTi3ghhfmT51aTiMS0xyGPLCLa/IWeLss +o60EHLsellGZR4lO7eKfcxLHmQcloP2QEbfnqAquSFGMM6zl3nF14kAc p9YKn9PYJV/maB6O71WiLgNo+xMpFm9WXv1znVS4LPtoXPalK/y+hZrYu UF1TF47Zft1iFEb5eSmEtm1+vRYAT2qbcafpxMeP53/60doRizMbgbiNG iXvtlMP9Mx3wspWXWXq9hbYDO9Jfmr7zQDU5sWGPHJoAYmdInellKWEqT Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="302972194" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="302972194" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Dec 2022 23:01:21 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10566"; a="644326571" X-IronPort-AV: E=Sophos;i="5.96,258,1665471600"; d="scan'208";a="644326571" Received: from unknown (HELO fred..) ([172.25.112.68]) by orsmga007.jf.intel.com with ESMTP; 19 Dec 2022 23:01:20 -0800 From: Xin Li To: linux-kernel@vger.kernel.org, x86@kernel.org, kvm@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, peterz@infradead.org, andrew.cooper3@citrix.com, seanjc@google.com, pbonzini@redhat.com, ravi.v.shankar@intel.com Subject: [RFC PATCH 32/32] x86/fred: disable FRED by default in its early stage Date: Mon, 19 Dec 2022 22:36:58 -0800 Message-Id: <20221220063658.19271-33-xin3.li@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221220063658.19271-1-xin3.li@intel.com> References: <20221220063658.19271-1-xin3.li@intel.com> MIME-Version: 1.0 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1752716986953725593?= X-GMAIL-MSGID: =?utf-8?q?1752716986953725593?= Disable FRED by default in its early stage. To enable FRED, a new kernel command line option "fred" needs to be added. Signed-off-by: Xin Li --- Documentation/admin-guide/kernel-parameters.txt | 4 ++++ arch/x86/kernel/cpu/common.c | 3 +++ 2 files changed, 7 insertions(+) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 42af9ca0127e..0bc76d926dd4 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -1506,6 +1506,10 @@ Warning: use of this parameter will taint the kernel and may cause unknown problems. + fred + Forcefully enable flexible return and event delivery, + which is otherwise disabled by default. + ftrace=[tracer] [FTRACE] will set and start the specified tracer as early as possible in order to facilitate early diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c index 5de68356fe62..1a160337ad41 100644 --- a/arch/x86/kernel/cpu/common.c +++ b/arch/x86/kernel/cpu/common.c @@ -1434,6 +1434,9 @@ static void __init cpu_parse_early_param(void) char *argptr = arg, *opt; int arglen, taint = 0; + if (!cmdline_find_option_bool(boot_command_line, "fred")) + setup_clear_cpu_cap(X86_FEATURE_FRED); + #ifdef CONFIG_X86_32 if (cmdline_find_option_bool(boot_command_line, "no387")) #ifdef CONFIG_MATH_EMULATION