Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp189259imj; Thu, 14 Feb 2019 18:17:45 -0800 (PST) X-Google-Smtp-Source: AHgI3IaVv8PjpF2fpwCPkstRz9lHEzCNbuZLpoKkZ9prW+x3Dk9AnFN4nWF8p9b5jBFwaDuTFORz X-Received: by 2002:a63:6c01:: with SMTP id h1mr3040198pgc.330.1550197064915; Thu, 14 Feb 2019 18:17:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550197064; cv=none; d=google.com; s=arc-20160816; b=kEEYe/t+eMdeCtMat8Q4ykilF5NsCEeGX44LCL1QAyLDXpB6TQ97/04AWJiDsz/RyG egY5pPXC9U5xh+ykiv5RGNZwY2LxBrCOFREYwzA7wZh7tXHn4j+CO1UVTMZZCn8AfhNu lND9aUhnB2Gd2QPBNEPIKg62Eax6aCigB4jwT3C5eUwmQZqaPteterYFgrlc8i/zmx/U 41lJgS+s+mfvuAAXfiuvQWyekCiZ3jufrDf13vNZ0mfIPErSPQ7lvX62LpX8d62D2d6H xLGJ3zAo0vqFVCJTXCJ8oJr44LIxca7i+vrlwVt3K9v17fX4JwyQfJ2aoe32dHbl4Lxx tOHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=3He2zllKMBuOdudK2l7nTy9GySRINoNeG7d9oSuJfNE=; b=b4N7mO6D0O5+d/XEW/8Z9m3TWfL2MhjoALXKUVIJ04ZxK4BylmcdiV99Wt6YF/I85d hevQ0Q00f7Qd1HgLJYANOqgrtsUr2a58ZGkVcVijBSqIwmj7Or+wFDwPcGTS7UQZE5xg ZKdRhzt9vddW9O6G9HBPnQfmOkPuOU4++FCLuoe8WHrSp4FcCSMx3B/yEXOQWNEpPJvr p34IHZgjxys4ZpyaJ7jd+gxaAmM+ixrcLnP6Zl9RXn1Z82l9FVp9903oab2y30YkvmO+ 2gr5FBQV63tE1DUGWcaHJwA30k6QHTo0d56rklhsK8M4lkKfe+eMU72qDrg9XYPQjAp1 P4WQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e5si769432pfi.48.2019.02.14.18.17.29; Thu, 14 Feb 2019 18:17:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733121AbfBNVqh (ORCPT + 99 others); Thu, 14 Feb 2019 16:46:37 -0500 Received: from smtprelay01.ispgateway.de ([80.67.18.13]:52622 "EHLO smtprelay01.ispgateway.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727356AbfBNVqg (ORCPT ); Thu, 14 Feb 2019 16:46:36 -0500 Received: from [77.22.253.72] (helo=calia.hitronhub.home) by smtprelay01.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.90_1) (envelope-from ) id 1guOpy-0001Qp-2n; Thu, 14 Feb 2019 22:46:30 +0100 From: =?UTF-8?q?Jan=20H=2E=20Sch=C3=B6nherr?= To: Borislav Petkov , Ingo Molnar , Thomas Gleixner , x86@kernel.org Cc: =?UTF-8?q?Jan=20H=2E=20Sch=C3=B6nherr?= , Paul Menzel , Thomas Lendacky , "H. Peter Anvin" , linux-kernel@vger.kernel.org Subject: [PATCH v2] x86/tsc: Allow quick PIT calibration despite interruptions Date: Thu, 14 Feb 2019 22:46:08 +0100 Message-Id: <20190214214608.8672-1-jan@schnhrr.de> X-Mailer: git-send-email 2.19.2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Df-Sender: am5Ac2Nobmhyci5kZQ== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some systems experience regular interruptions (60 Hz SMI?), that prevent the quick PIT calibration from succeeding: individual interruptions can be so long, that the PIT MSB is observed to decrement by 2 or 3 instead of 1. The existing code cannot recover from this. The system in question is an AMD Ryzen Threadripper 2950X, microcode 0x800820b, on an ASRock Fatal1ty X399 Professional Gaming, BIOS P3.30. Change the code to handle (almost) arbitrary interruptions, as long as they happen only once in a while and they do not take too long. Specifically, also cover an interruption during the very first reads. Signed-off-by: Jan H. Schönherr --- v2: - Dropped the other hacky patch for the time being. - Fixed the early exit check. - Hopefully fixed all inaccurate math in v1. - Extended comments. arch/x86/kernel/tsc.c | 91 +++++++++++++++++++++++++++---------------- 1 file changed, 57 insertions(+), 34 deletions(-) diff --git a/arch/x86/kernel/tsc.c b/arch/x86/kernel/tsc.c index e9f777bfed40..aced427371f7 100644 --- a/arch/x86/kernel/tsc.c +++ b/arch/x86/kernel/tsc.c @@ -485,7 +485,7 @@ static inline int pit_verify_msb(unsigned char val) static inline int pit_expect_msb(unsigned char val, u64 *tscp, unsigned long *deltap) { int count; - u64 tsc = 0, prev_tsc = 0; + u64 tsc = get_cycles(), prev_tsc = 0; for (count = 0; count < 50000; count++) { if (!pit_verify_msb(val)) @@ -500,7 +500,7 @@ static inline int pit_expect_msb(unsigned char val, u64 *tscp, unsigned long *de * We require _some_ success, but the quality control * will be based on the error terms on the TSC values. */ - return count > 5; + return count > 0 && pit_verify_msb(val - 1); } /* @@ -515,7 +515,8 @@ static inline int pit_expect_msb(unsigned char val, u64 *tscp, unsigned long *de static unsigned long quick_pit_calibrate(void) { int i; - u64 tsc, delta; + u64 tsc = 0, delta; + unsigned char start; unsigned long d1, d2; if (!has_legacy_pic()) @@ -547,43 +548,65 @@ static unsigned long quick_pit_calibrate(void) */ pit_verify_msb(0); - if (pit_expect_msb(0xff, &tsc, &d1)) { - for (i = 1; i <= MAX_QUICK_PIT_ITERATIONS; i++) { - if (!pit_expect_msb(0xff-i, &delta, &d2)) - break; - - delta -= tsc; - - /* - * Extrapolate the error and fail fast if the error will - * never be below 500 ppm. - */ - if (i == 1 && - d1 + d2 >= (delta * MAX_QUICK_PIT_ITERATIONS) >> 11) - return 0; - - /* - * Iterate until the error is less than 500 ppm - */ - if (d1+d2 >= delta >> 11) - continue; - - /* - * Check the PIT one more time to verify that - * all TSC reads were stable wrt the PIT. - * - * This also guarantees serialization of the - * last cycle read ('d2') in pit_expect_msb. - */ - if (!pit_verify_msb(0xfe - i)) - break; - goto success; + /* + * Reading the PIT may fail or experience unexpected delays (due to + * SMIs, for example). Assuming, that these underlying interruptions + * happen only once in a while, we wait for two successful reads. + * Of these, we assume that the better one was not delayed and use + * it as the base for later calculations. + */ + for (i = 0; i <= MAX_QUICK_PIT_ITERATIONS; i++) { + if (!pit_expect_msb(0xff - i, &delta, &d2)) + continue; + + if (!tsc) { + /* first success */ + start = i; + tsc = delta; + d1 = d2; + continue; } + + /* second success */ + delta -= tsc; + do_div(delta, i - start); + if (d2 < d1) { + start = i; + tsc += delta; + d1 = d2; + } + goto calibrate; + } + + pr_info("Fast TSC calibration failed (couldn't even start)\n"); + return 0; + +calibrate: + /* + * Extrapolate the error based on the better of the first two successes + * and fail fast if the error will never be below 500 ppm. + */ + if (d1 + d1 >= (delta * MAX_QUICK_PIT_ITERATIONS) >> 11) { + pr_info("Fast TSC calibration failed (wouldn't work)\n"); + return 0; } + + for (i++; i <= MAX_QUICK_PIT_ITERATIONS; i++) { + if (!pit_expect_msb(0xff - i, &delta, &d2)) + continue; + + delta -= tsc; + + /* Stop when the error is less than 500 ppm */ + if (d1 + d2 < delta >> 11) + goto success; + } + pr_info("Fast TSC calibration failed\n"); return 0; success: + i -= start; /* * Ok, if we get here, then we've seen the * MSB of the PIT decrement 'i' times, and the -- 2.19.2