From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.5 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5CBFCC5DF9D for ; Tue, 27 Oct 2020 11:28:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id EE8D322258 for ; Tue, 27 Oct 2020 11:28:15 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="CYexGtVJ" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1749905AbgJ0L2N (ORCPT ); Tue, 27 Oct 2020 07:28:13 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:39038 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1749898AbgJ0L2M (ORCPT ); Tue, 27 Oct 2020 07:28:12 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1603798089; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=688aZm0PD/3SiVRwK7iawCj1jbJr07QWKg/+VEWty/w=; b=CYexGtVJsdZJD7HMAzLaQmv7ZRr2jOjbbyMwK6ht0uDWCG7ziY+wJj0hEilCoNyep+kWl1 n1t+wJvBwEwrEei8HkNPCKzPg0HNqxXu1JY0VPCDpVByBg5stmVLG8SysHG2bDi1XWnnt5 4otomaR6OZOrQc0KXsQKXdUYfq6DZfg= Received: from mail-ej1-f69.google.com (mail-ej1-f69.google.com [209.85.218.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-237-I6ehVw8AMKqBG0i2cAwy3Q-1; Tue, 27 Oct 2020 07:28:07 -0400 X-MC-Unique: I6ehVw8AMKqBG0i2cAwy3Q-1 Received: by mail-ej1-f69.google.com with SMTP id pk23so785603ejb.4 for ; Tue, 27 Oct 2020 04:28:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=688aZm0PD/3SiVRwK7iawCj1jbJr07QWKg/+VEWty/w=; b=dFduCyy5oaeL9oF7Vk1xw20EbsoosqRiHrtx+3a6a64IPlUjBU1IINfS3Cbh5e8qZj G1FDRzODYUEZEKt4NWJzUUODVY+VV2E3sVhNC8cEUssH5DpXigtPxPrSEYm0wbg7YRs5 ywZNCcctTOJLDU8/K7F0n8tk8K8MfQAKkw+Cl3lUsDLJFaVVlFzcmGRG9/FaCUgYEmV6 +UvWL9J7KyX6y9tudENNYVnWSAGD2Qh2eH56gevWkOWj7X6HNhI9tU3jGxGmCILD4fi3 SBb0qND50ZR1xOK1lcjpXHiSmvTmRvlNnex4wiipNsaCR9usihM2xuUUsEW8//2vOxYk db3w== X-Gm-Message-State: AOAM530Is37lCklPR+ODSoAxbWiTZqj1LJtTKIriU0vLLbWxHjIZ7Xwm gZ63S5p2RmrnANXXr+1xEUzfvwmf49yiPbHZMqGrTJEKuJL//3+r9vc7cumHwJqLb0D3vhBVZPW 7FAOykbGb0/paUEC7LhfH X-Received: by 2002:aa7:c358:: with SMTP id j24mr1706685edr.265.1603798086278; Tue, 27 Oct 2020 04:28:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNks/irBNquuX2qqWze7N1uU8iJmXriG2IIP0ADY1uAEjDy9xgloHTRusFL49PMuOlbI5UNg== X-Received: by 2002:aa7:c358:: with SMTP id j24mr1706652edr.265.1603798085964; Tue, 27 Oct 2020 04:28:05 -0700 (PDT) Received: from x1.localdomain (2001-1c00-0c0c-fe00-d2ea-f29d-118b-24dc.cable.dynamic.v6.ziggo.nl. [2001:1c00:c0c:fe00:d2ea:f29d:118b:24dc]) by smtp.gmail.com with ESMTPSA id yw17sm856915ejb.97.2020.10.27.04.28.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 27 Oct 2020 04:28:05 -0700 (PDT) Subject: Re: [PATCH V8 0/5] Intel Platform Monitoring Technology To: "David E. Box" , lee.jones@linaro.org, dvhart@infradead.org, andy@infradead.org, bhelgaas@google.com, alexey.budankov@linux.intel.com Cc: linux-kernel@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-pci@vger.kernel.org References: <20201003013123.20269-1-david.e.box@linux.intel.com> From: Hans de Goede Message-ID: <2f17db4b-2988-7f0d-fd0e-9e5b621d24ec@redhat.com> Date: Tue, 27 Oct 2020 12:28:04 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.3.1 MIME-Version: 1.0 In-Reply-To: <20201003013123.20269-1-david.e.box@linux.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org Hi, On 10/3/20 3:31 AM, David E. Box wrote: > Intel Platform Monitoring Technology (PMT) is an architecture for > enumerating and accessing hardware monitoring capabilities on a device. > With customers increasingly asking for hardware telemetry, engineers not > only have to figure out how to measure and collect data, but also how to > deliver it and make it discoverable. The latter may be through some device > specific method requiring device specific tools to collect the data. This > in turn requires customers to manage a suite of different tools in order to > collect the differing assortment of monitoring data on their systems. Even > when such information can be provided in kernel drivers, they may require > constant maintenance to update register mappings as they change with > firmware updates and new versions of hardware. PMT provides a solution for > discovering and reading telemetry from a device through a hardware agnostic > framework that allows for updates to systems without requiring patches to > the kernel or software tools. > > PMT defines several capabilities to support collecting monitoring data from > hardware. All are discoverable as separate instances of the PCIE Designated > Vendor extended capability (DVSEC) with the Intel vendor code. The DVSEC ID > field uniquely identifies the capability. Each DVSEC also provides a BAR > offset to a header that defines capability-specific attributes, including > GUID, feature type, offset and length, as well as configuration settings > where applicable. The GUID uniquely identifies the register space of any > monitor data exposed by the capability. The GUID is associated with an XML > file from the vendor that describes the mapping of the register space along > with properties of the monitor data. This allows vendors to perform > firmware updates that can change the mapping (e.g. add new metrics) without > requiring any changes to drivers or software tools. The new mapping is > confirmed by an updated GUID, read from the hardware, which software uses > with a new XML. > > The current capabilities defined by PMT are Telemetry, Watcher, and > Crashlog. The Telemetry capability provides access to a continuous block > of read only data. The Watcher capability provides access to hardware > sampling and tracing features. Crashlog provides access to device crash > dumps. While there is some relationship between capabilities (Watcher can > be configured to sample from the Telemetry data set) each exists as stand > alone features with no dependency on any other. The design therefore splits > them into individual, capability specific drivers. MFD is used to create > platform devices for each capability so that they may be managed by their > own driver. The PMT architecture is (for the most part) agnostic to the > type of device it can collect from. Software can determine which devices > support a PMT feature by searching through each device node entry in the > sysfs class folder. It can additionally determine if a particular device > supports a PMT feature by checking for a PMT class folder in the device > folder. > > This patch set provides support for the PMT framework, along with support > for Telemetry on Tiger Lake. The entire series looks good to me, so you may add my: Reviewed-by: Hans de Goede To the entire series. Lee, in the discussion about previous versions you indicated that you would be happy to merge the entire series through the MFD tree. >From my pov this is ready for merging, so if you can pick up the entire series and then provide me with an immutable branch to merge into the pdx86 tree that would be great. Regards, Hans