Received: by 10.213.65.68 with SMTP id h4csp638801imn; Fri, 23 Mar 2018 12:14:42 -0700 (PDT) X-Google-Smtp-Source: AG47ELthdhBTi+DUD21aVLQeqyZaa91okHky4AuPzBdpLGCi+xCcyKbKJDfikiSB0bIpDQcsQK05 X-Received: by 2002:a17:902:7b81:: with SMTP id w1-v6mr6785815pll.66.1521832482033; Fri, 23 Mar 2018 12:14:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521832481; cv=none; d=google.com; s=arc-20160816; b=EZTF7wfh8oQHSZ2HU0VMQOUyLt31qtNG2+a9aIt+1vvWwbQhg57M825iMdqzcQFqVL 72yOjKSzD4BIO2sva3hy86xup6bdAMGml8RtYE3D76kc9fGFSmsEw/P7H2ohRtuuhS6c IZfjlaTmxwc7tuzGBZ+Re5Oj5vWojhOuayk0AmGfd4VwYrmnajPzcDKjyb/fDVlrIcyE laJU7F2zzkd7O6xohfrSyTGOAduYQmP7ZASQz2x3cElYl5zibTlfQCRi3cL/95AHg3fv zCsx8eVQB08Ira1JV6lKqe+MyoMVWD2OKmnoZ7K5TbuUh2KmjB9PVuut7dgZuckFFNU2 MEsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:spamdiagnosticmetadata:spamdiagnosticoutput :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=X/SrjAnErWlN3p+NqH6XcVYz7IgI0T/mH807OuHqx6g=; b=jfsL2BFekemSSoRPVuwBYMIUAXl8UyIpYs2us9kgk5DSc38YTLA7zet6PrSCET+teY 32TbqJ9wkMHIGwn/P9nGAic9egzDTyYCtCOCdK4aPzSgUhbFk03Rw7kcgN7M+1L+MjV3 03DRitDbkEh8gLgclIpm3ExwZL4nxgKdrcb177Bh3qSSsJ0+F3bNSxfGeiCvtUly2Y+7 5SoxqvDnH+10xN+O/791vM7k3S+V9WZ9V0qN/z1z1IDl2/Fw7Apb0WL6Yx2M3H7FvsKR VSFrnx1+DLuCV9PoR5eOq2hsKwx+joSTVTW94rj1y+hFKHxk1M/h8qylemh+HCJ0g95z YvuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@onevmw.onmicrosoft.com header.s=selector1-vmware-com header.b=l/crQotD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t71si6452116pgb.70.2018.03.23.12.14.27; Fri, 23 Mar 2018 12:14:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@onevmw.onmicrosoft.com header.s=selector1-vmware-com header.b=l/crQotD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752384AbeCWTMz (ORCPT + 99 others); Fri, 23 Mar 2018 15:12:55 -0400 Received: from mail-co1nam03on0079.outbound.protection.outlook.com ([104.47.40.79]:20899 "EHLO NAM03-CO1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752105AbeCWTMx (ORCPT ); Fri, 23 Mar 2018 15:12:53 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=onevmw.onmicrosoft.com; s=selector1-vmware-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=X/SrjAnErWlN3p+NqH6XcVYz7IgI0T/mH807OuHqx6g=; b=l/crQotDbW5bKJ4fnfsEwbmmKFAUrzGVIPZ34rJUK7osURTjR6yGKjwVlMy7djMgA5XN+/OnvBRXxUrBalR+XyR6szf0vWZDjvhrxLsKTyt1gFWLuZSHfeFF1YEuNRDNcJGqGFRTWgf9i38XiUS9PZctyvlcQ0fOYdanu9jwURI= Received: from SN2PR05MB2654.namprd05.prod.outlook.com (10.166.212.137) by SN2PR05MB2718.namprd05.prod.outlook.com (10.167.19.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.631.5; Fri, 23 Mar 2018 19:12:51 +0000 Received: from SN2PR05MB2654.namprd05.prod.outlook.com ([fe80::740a:82de:4e00:2810]) by SN2PR05MB2654.namprd05.prod.outlook.com ([fe80::740a:82de:4e00:2810%7]) with mapi id 15.20.0631.004; Fri, 23 Mar 2018 19:12:51 +0000 From: Nadav Amit To: Dave Hansen CC: "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , "aarcange@redhat.com" , "luto@kernel.org" , "torvalds@linux-foundation.org" , "keescook@google.com" , "hughd@google.com" , "jgross@suse.com" , "x86@kernel.org" Subject: Re: [PATCH 09/11] x86/pti: enable global pages for shared areas Thread-Topic: [PATCH 09/11] x86/pti: enable global pages for shared areas Thread-Index: AQHTws71NUJeW1FkN0SdPdI31gfiM6PeMD+A Date: Fri, 23 Mar 2018 19:12:50 +0000 Message-ID: <7B08037D-1682-406D-90F1-C2B5B1899F7F@vmware.com> References: <20180323174447.55F35636@viggo.jf.intel.com> <20180323174500.64BD3D36@viggo.jf.intel.com> In-Reply-To: <20180323174500.64BD3D36@viggo.jf.intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [208.91.2.2] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;SN2PR05MB2718;7:m7rBtsiLC5eKNqI5zIsE3iKN9FaY0SXutJReNt6jJ7XKEt5V3BE4IjnLJL4ofNafz4Rv5o5ALUmsX7ggtVpvtm5GRthfCL1umVPbYTJ3VDa7iMUIs7ZKitP6fL49fy449WlZuLYTST8+SfPVCbWCXALejAo4mc/MuDxtY/vZ+1nFnvLBqI3iynyPiOeVgighdkwh1BcdHh4tPAb1ksnQwRttObdOf1jyTFPAguoCGxD/TGf8bCWtvOjjf9VrnSIW;20:yZszk/jHi9hIVh+n51hkUr8i0rWq7zaOsFqQPkNtdxGwsMYjf8divIAkowulv66BM0sakcf9lpzJFL+EDodTN1mNwC+y8zBFNzvGGjSQ68qNoXs4eWJ1urx10VtMnojw11vxR+h7/MajA7EYKwpZVmvtO29o9lFvj5UlZk7SRJg= x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-correlation-id: 2f146f53-425b-4979-2f34-08d590f2128a x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);SRVR:SN2PR05MB2718; x-ms-traffictypediagnostic: SN2PR05MB2718: authentication-results: spf=none (sender IP is ) smtp.mailfrom=namit@vmware.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(228905959029699); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231221)(944501327)(52105095)(6041310)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011);SRVR:SN2PR05MB2718;BCL:0;PCL:0;RULEID:;SRVR:SN2PR05MB2718; x-forefront-prvs: 0620CADDF3 x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(366004)(39380400002)(376002)(396003)(346002)(39860400002)(199004)(189003)(81156014)(82746002)(2906002)(81166006)(25786009)(97736004)(106356001)(99286004)(316002)(102836004)(86362001)(478600001)(54906003)(6246003)(2616005)(3846002)(76176011)(6506007)(6116002)(8676002)(3660700001)(5250100002)(6916009)(4326008)(7416002)(66066001)(6512007)(26005)(2900100001)(33656002)(186003)(68736007)(3280700002)(305945005)(6436002)(229853002)(105586002)(14454004)(8936002)(11346002)(7736002)(6486002)(5660300001)(36756003)(53936002)(83716003)(446003);DIR:OUT;SFP:1101;SCL:1;SRVR:SN2PR05MB2718;H:SN2PR05MB2654.namprd05.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; received-spf: None (protection.outlook.com: vmware.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: SAK52YB/82nqjCR0G4OE0v9ZOyPGFQpC07a4vE3H8JE8JQeOs6GzcvsefpM5cjy/p6efFrE42L0uq6cUZKMdg0ZuyqCYo0yN9GxOS65yJ6jfFL3bA65GBQUKQYBJWGlnqwAUTOokJb+CQw7H1QLnTmhnhIHJrGWhSZd2HkZ1+vZ6tTA9wkdXNR+RsGKUCi+d8KPArvCU2VedfpyO8bksRQEYuTBwGFVLrxp/CFBXjgBO0gVwZc1JGZSAvVVboqE9jk9hoQ2O9sTxhXvHyBVhICAYN+g/XYSlxcAPaIlEiItjOsjhsFtHQYDyBUcUjmUM/g4k08F4/6zQPrFlmq5tPA== spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-ID: <68D286D9C7305E439D4DBD5FE5AAAEFC@namprd05.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: vmware.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2f146f53-425b-4979-2f34-08d590f2128a X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Mar 2018 19:12:50.7822 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b39138ca-3cee-4b4a-a4d6-cd83d9dd62f0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR05MB2718 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dave Hansen wrote: >=20 > From: Dave Hansen >=20 > The entry/exit text and cpu_entry_area are mapped into userspace and > the kernel. But, they are not _PAGE_GLOBAL. This creates unnecessary > TLB misses. >=20 > Add the _PAGE_GLOBAL flag for these areas. >=20 > static void __init > diff -puN arch/x86/mm/pti.c~kpti-why-no-global arch/x86/mm/pti.c > --- a/arch/x86/mm/pti.c~kpti-why-no-global 2018-03-21 16:32:00.799192311 = -0700 > +++ b/arch/x86/mm/pti.c 2018-03-21 16:32:00.803192311 -0700 > @@ -300,6 +300,13 @@ pti_clone_pmds(unsigned long start, unsi > return; >=20 > /* > + * Setting 'target_pmd' below creates a mapping in both > + * the user and kernel page tables. It is effectively > + * global, so set it as global in both copies. > + */ > + *pmd =3D pmd_set_flags(*pmd, _PAGE_GLOBAL); if (boot_cpu_has(X86_FEATURE_PGE)) ?