Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp358404imm; Fri, 3 Aug 2018 04:47:44 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcm2QCwi3KabXrf/zCwy1jWVR4QtNMC3TO6hDmEGaGyieMsuasjx+knRhWwqKoNzkvlxI2Q X-Received: by 2002:a63:4d5:: with SMTP id 204-v6mr3411866pge.129.1533296864457; Fri, 03 Aug 2018 04:47:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533296864; cv=none; d=google.com; s=arc-20160816; b=asDWo4qSrfs3HYwIXm+kBXWjeutbDzvy89trSCaRfeWvo7Jmub5rDel8oinFRVjKwY wN/Tyx19lgonhtnZi84V9PLUHv98kmDj7DSvbl2cdeHLpNV6Hu+kYA5ynL2IhZIzzPPA oG/hx7g/etNgOWfr6chhuUqTOz6ydFfesD8faMs7BSlOt+KnDhE5fvxzer1QJ8cTIhW9 Soz8WYxgiys2JqRsHI4dMBRXu9Ksy7usz2XdBgVmT2iXQG+SSNbJeOGZTLFiNQV649EI bVjSWSSAAXbXqoAKlV8B2P4cGCW3E0USpV1JyDPxscNNpxLBXfRHdHYOv0mZ6it8Mlod CIXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=TL+8IQnsysMMvvQ6PPFRQCiBvmcxO3a28jSfPqu+j+0=; b=d6BPjTejOPEuPOystC+NabBU4JoBOWLjCvDKDJdFsQLjWn9cgSkV/rz04n2+x84vO6 IZlhlilUt59hlo0m1AqFabjzuXaCPAuFWGTECkcNQ6sCa4AhpB6yFmZME88xgGJPFQtR u6mOfa94aSOkadUlRpYed0eFcMJurkw6furp6P6bVm981QxNsPY4hxMThQeVvQaGpdKc JzsgqubdoUtUMcslUbANqyUfTMEr75+5qJtVWnreAieLghLrMAejFSLiiM1NxsQN1JPU htz1uU6LrI0XUjeKkQEpLG61WBvRGe41TKFm5+EzBhL91C2WjH2szNVD0yzTFbAw6waH Wmwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p67-v6si4950432pfg.295.2018.08.03.04.47.29; Fri, 03 Aug 2018 04:47:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728139AbeHCNl7 (ORCPT + 99 others); Fri, 3 Aug 2018 09:41:59 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:39651 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727405AbeHCNl7 (ORCPT ); Fri, 3 Aug 2018 09:41:59 -0400 Received: from hsi-kbw-5-158-153-52.hsi19.kabel-badenwuerttemberg.de ([5.158.153.52] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1flYWF-0007RQ-7M; Fri, 03 Aug 2018 13:45:19 +0200 Date: Fri, 3 Aug 2018 13:45:18 +0200 (CEST) From: Thomas Gleixner To: Reinette Chatre cc: fenghua.yu@intel.com, Tony Luck , vikas.shivappa@linux.intel.com, gavin.hindman@intel.com, jithu.joseph@intel.com, dave.hansen@intel.com, mingo@redhat.com, "H. Peter Anvin" , x86@kernel.org, LKML , Peter Zijlstra Subject: Re: [RFC PATCH 0/7] x86/intel_rdt: Restoration of Cache Pseudo-Locked regions In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 24 Jul 2018, Reinette Chatre wrote: > Dear Maintainers, > > A Cache Pseudo-Locked region is vulnerable to certain instructions (INVD, > WBINVD, CLFLUSH) or deeper C-states (that could shrink or power off the > cache) evicting the pseudo-locked memory. The current support for > pseudo-locked regions already restrict deeper C-states on cores associated > with the pseudo-locked regions, but the vulnerability to some instructions > remain. > > This work does not prevent the instructions to which Cache Pseudo-Locked > regions are vulnerable, instead, this work support the restoration of > Cache Pseudo-Locked regions that can be triggered manually by the user > or automatically after the WBINVD instruction has been issued. > > A new debugfs file "pseudo_lock_restore" is associated with each > pseudo-locked region and can be used to manually trigger the memory > associated with the region to be pseudo-locked to cache again. I'm not seeing how that should be used. What's the indication for an operator to write to that file? > The system-wide "native_wbinvd()" is modified to trigger the restoration of > all Cache Pseudo-Locked regions after the WBINVD instruction returns and > effort is made to avoid any unnecessary work in this flow. > > Within the kernel two locations with direct invocations of the WBINVD > instruction are coverted to native_wbinvd() and compile tested. Neither > location is likely to be used on the platforms supporting Cache Pseudo-Locking. Can we just get rid of WBINVD? Thanks, tglx