Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp89833imm; Thu, 21 Jun 2018 14:29:32 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLQRcs95xyGe6b6U5TVlLkpyzfUR0rQWuqOnc4GdU1ffWPiD645NLPSYnY1f1XLhsET4MkH X-Received: by 2002:a62:701:: with SMTP id b1-v6mr29178232pfd.252.1529616572067; Thu, 21 Jun 2018 14:29:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529616572; cv=none; d=google.com; s=arc-20160816; b=wQzkJnRuWO1AMRN5jcKoXapepLEhQBKS+W+WD1WuO8iPDluOf4MbJugb4orf+Ss2qR LumA/roHULCxdEu3U4DvyVqXSK6bMNptmJQP8pJIX4nlGOYaeu/l77kXn7mtOhUvRg6p C9eCoOX2ezKpOfUMVtxiAl6UeJwh/1zvg4k74G+/glZ+rkaVrAr4rMaj+Ge1Tpsc98Cc QHwxfEJrnH2a3vLtjxTWZppSap4HAW/HF/Rvq5eNFbZ6UKabKgLrTYuVoVwDlHIsDGdH I7GMpQ3/Plgc5v1Py6yqWEnOp2JBVd+Fy8cSNhSrMzUqXPU/0BwN/T1LRrkpGgjJXhb0 igOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:dkim-signature:arc-authentication-results; bh=KTfTGJuEknVpsQbIpnFslikTrYwobpFQwyRMEWyqxcg=; b=MLare2RuJOeecgWHG+bS9WBytNset7r4NwzF3IEDr8Z/4RCNanuBkcZNbr4j0vXPwg i4STB20vu20Ie0lCuqzO2N9Am2bPxZK1T7a75sKwFkAe6zEx5VhdIq+eV2HxQbbKl/QN ZBrx/V6MaNXXNV9Iuz2XQs8YNBO+ITbgl3QBmgZpGprIPhISzd1tMaT5fBsF51qh7VUE donFL2n7Zyrjt9hHKfshRd8TZl2iV/M+l1ZWCKfrwuZUfWO5uL1H8/1rEEDpGz7VQEuO RHXnx6NYpMMqBWlCATetJUdg0sitpDAlUTBCIJTqrODrDXf9ZoM9aoMXwUqqgkw5Jhv1 k9yA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=a3mDk3iT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x14-v6si4751974pgq.242.2018.06.21.14.29.17; Thu, 21 Jun 2018 14:29:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=a3mDk3iT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933676AbeFUV0c (ORCPT + 99 others); Thu, 21 Jun 2018 17:26:32 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:48084 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933310AbeFUV0a (ORCPT ); Thu, 21 Jun 2018 17:26:30 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w5LLOhMD099985; Thu, 21 Jun 2018 21:25:32 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : subject : date : message-id : in-reply-to : references; s=corp-2017-10-26; bh=KTfTGJuEknVpsQbIpnFslikTrYwobpFQwyRMEWyqxcg=; b=a3mDk3iTs8SadUy3iZ0W509DPYYT8N6z0n7zuqhzIee6tWe5luuF5UechVPUVWav+Dft rS22kRW4ggMHJ+GOoDrpWKocNQyfgmmhk6I70bfeROCznBjzMmfcJfaxkcs5oVsOYgCH XhXbniiYO3Y9vimjqnY8DUldzp7XvMzddINeTjE09OWh0Adxm1yzvqFr3R8zZEtmaCO5 a4joV3Lee0Xwr6PheR4yPxhlv+2hn5Wj0IhgCK7d8bU1Dl8bNQXMqPwx46joUjAd6vsx cur+O83S1suJHtZw9RhlNFBAcVRHY33Xl9btZy5mv1Uw8yXXneCD7jW/aQkTfoFZnal+ Jw== Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2120.oracle.com with ESMTP id 2jmu6y3nxn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 Jun 2018 21:25:32 +0000 Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w5LLPVe9028210 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 Jun 2018 21:25:31 GMT Received: from abhmp0010.oracle.com (abhmp0010.oracle.com [141.146.116.16]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w5LLPUwF015182; Thu, 21 Jun 2018 21:25:30 GMT Received: from xakep.us.oracle.com (/10.39.228.116) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 21 Jun 2018 14:25:30 -0700 From: Pavel Tatashin To: steven.sistare@oracle.com, daniel.m.jordan@oracle.com, linux@armlinux.org.uk, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, john.stultz@linaro.org, sboyd@codeaurora.org, x86@kernel.org, linux-kernel@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, hpa@zytor.com, douly.fnst@cn.fujitsu.com, peterz@infradead.org, prarit@redhat.com, feng.tang@intel.com, pmladek@suse.com, gnomes@lxorguk.ukuu.org.uk, linux-s390@vger.kernel.org Subject: [PATCH v12 03/11] x86/tsc: redefine notsc to behave as tsc=unstable Date: Thu, 21 Jun 2018 17:25:10 -0400 Message-Id: <20180621212518.19914-4-pasha.tatashin@oracle.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180621212518.19914-1-pasha.tatashin@oracle.com> References: <20180621212518.19914-1-pasha.tatashin@oracle.com> X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8931 signatures=668703 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806210230 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, notsc kernel parameter disables the use of tsc register by sched_clock(). However, this parameter does not prevent linux from accessing tsc in other places in kernel. The only rational to boot with notsc is to avoid timing discrepancies on multi-socket systems where different tsc frequencies may present, and thus fallback to jiffies for clock source. However, there is another method to solve the above problem, it is to boot with tsc=unstable parameter. This parameter allows sched_clock() to use tsc but in case tsc is outside of expected interval it is corrected back to a sane value. This is why there is no reason to keep notsc, and it can be removed. But, for compatibility reasons we will keep this parameter but change its definition to be the same as tsc=unstable. Signed-off-by: Pavel Tatashin Reviewed-by: Dou Liyang --- .../admin-guide/kernel-parameters.txt | 2 -- Documentation/x86/x86_64/boot-options.txt | 4 +--- arch/x86/kernel/tsc.c | 18 +++--------------- 3 files changed, 4 insertions(+), 20 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index efc7aa7a0670..f7123d28f318 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2835,8 +2835,6 @@ nosync [HW,M68K] Disables sync negotiation for all devices. - notsc [BUGS=X86-32] Disable Time Stamp Counter - nowatchdog [KNL] Disable both lockup detectors, i.e. soft-lockup and NMI watchdog (hard-lockup). diff --git a/Documentation/x86/x86_64/boot-options.txt b/Documentation/x86/x86_64/boot-options.txt index 8d109ef67ab6..66114ab4f9fe 100644 --- a/Documentation/x86/x86_64/boot-options.txt +++ b/Documentation/x86/x86_64/boot-options.txt @@ -92,9 +92,7 @@ APICs Timing notsc - Don't use the CPU time stamp counter to read the wall time. - This can be used to work around timing problems on multiprocessor systems - with not properly synchronized CPUs. + Deprecated, use tsc=unstable instead. nohpet Don't use the HPET timer. diff --git a/arch/x86/kernel/tsc.c b/arch/x86/kernel/tsc.c index 74392d9d51e0..186395041725 100644 --- a/arch/x86/kernel/tsc.c +++ b/arch/x86/kernel/tsc.c @@ -38,11 +38,6 @@ EXPORT_SYMBOL(tsc_khz); */ static int __read_mostly tsc_unstable; -/* native_sched_clock() is called before tsc_init(), so - we must start with the TSC soft disabled to prevent - erroneous rdtsc usage on !boot_cpu_has(X86_FEATURE_TSC) processors */ -static int __read_mostly tsc_disabled = -1; - static DEFINE_STATIC_KEY_FALSE(__use_tsc); int tsc_clocksource_reliable; @@ -248,8 +243,7 @@ EXPORT_SYMBOL_GPL(check_tsc_unstable); #ifdef CONFIG_X86_TSC int __init notsc_setup(char *str) { - pr_warn("Kernel compiled with CONFIG_X86_TSC, cannot disable TSC completely\n"); - tsc_disabled = 1; + mark_tsc_unstable("boot parameter notsc"); return 1; } #else @@ -1307,7 +1301,7 @@ static void tsc_refine_calibration_work(struct work_struct *work) static int __init init_tsc_clocksource(void) { - if (!boot_cpu_has(X86_FEATURE_TSC) || tsc_disabled > 0 || !tsc_khz) + if (!boot_cpu_has(X86_FEATURE_TSC) || !tsc_khz) return 0; if (tsc_unstable) @@ -1414,12 +1408,6 @@ void __init tsc_init(void) set_cyc2ns_scale(tsc_khz, cpu, cyc); } - if (tsc_disabled > 0) - return; - - /* now allow native_sched_clock() to use rdtsc */ - - tsc_disabled = 0; static_branch_enable(&__use_tsc); if (!no_sched_irq_time) @@ -1455,7 +1443,7 @@ unsigned long calibrate_delay_is_known(void) int constant_tsc = cpu_has(&cpu_data(cpu), X86_FEATURE_CONSTANT_TSC); const struct cpumask *mask = topology_core_cpumask(cpu); - if (tsc_disabled || !constant_tsc || !mask) + if (!constant_tsc || !mask) return 0; sibling = cpumask_any_but(mask, cpu); -- 2.17.1