Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2795712ybi; Sun, 9 Jun 2019 21:27:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZF0MIgyZV6ytVkDPRjwSm7Xnkqtq35Fa024ENyufWKfuF2kzt+qiyQ7FJgPSJUly/7O6d X-Received: by 2002:a62:b405:: with SMTP id h5mr70331726pfn.85.1560140846659; Sun, 09 Jun 2019 21:27:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560140846; cv=none; d=google.com; s=arc-20160816; b=R/fLgo1BhU7QpRf+ykafxCm29xdLbA1AZyhNXzP3VFkb7G4vRKADocYyGRdqjTBjn2 66WMq4gVB4gaXDkRj9LvxyaovM9yPJSAStwqDhtQGpehc5Forpw9RAVeNkXbhd5PkIdm sbVgtRpujFGT0+nNHlTSjNGUiPab446rt4g/BzXcnleZ00yobLOmHVpLqn5wWQChySbV bUi9GDdGq4Q4n+udzjHM3NjmWQVHojokRp6YJYxjj4xv6ybx8/1cHWPn4H8zlU0D3rCz zxFL1UtML7vqG64n+kS6bq6i3ejEp7RO6thJW/Kj4ki0OjzXmb/5O9j/kozcsuoE67Ym 6MfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=bpPcUjTWMZheoBb4PfC2G9ThCAgFOS7v3FXovO9vcM0=; b=wnmIpoYHT7aO9HULycN36ymZZnNd3diZXSUvgUrs80syknsn5815jYaKl4oYTOVNxe s2DB/XnyeO+dZ9I1btIqops2Yybpq/quT2kRqHClQuW2jn8srvP0sbTdZ7LDldyyyaz5 gDEFwokHWMI2D7ttIp0yBAzA/zvKPp3YZ4c2nm5Qa+l3yL2JeZHUgaW7y/WZKpPCBmjO IKtEkRDP99QIo2hAV8zwqiWk+z89tOF3vlo8TvoWnvVEQcyX1ruKA5jpX4F1yU/Dmni6 2/lyoubKsz/ozvFwI82zMb8d625gKgdUhsqrLJo6z9OJhiWoTXK3yiFvlC2XYX5G+yuc yFDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YHtiZYZO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h36si8811867plb.199.2019.06.09.21.27.11; Sun, 09 Jun 2019 21:27:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YHtiZYZO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730372AbfFJEYd (ORCPT + 99 others); Mon, 10 Jun 2019 00:24:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:45028 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726070AbfFJEYd (ORCPT ); Mon, 10 Jun 2019 00:24:33 -0400 Received: from mail-wr1-f45.google.com (mail-wr1-f45.google.com [209.85.221.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B50E3208C0 for ; Mon, 10 Jun 2019 04:24:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560140672; bh=EGbpm2FlzOHNWVYlrQW0pWEde4YMYQg12Rsn/hOXDUU=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=YHtiZYZOrNDYinwCn6pmq1We6Z/3llAWGwjoeL2R10wNM4iXMqPEURMaCyKSES64C lpUYUAkq/DdFQ2VDyyN5AyngOn78tvOPKH66pq+DlKBMAwzEF6dCmbZR+ZCL8hg6Dv pdtoCY76qouJpf0UwgwrGFrK7FAxhmM3GPKVCtGQ= Received: by mail-wr1-f45.google.com with SMTP id r18so7642736wrm.10 for ; Sun, 09 Jun 2019 21:24:31 -0700 (PDT) X-Gm-Message-State: APjAAAWU1OZ711tY5x5unLBmtS8oXwG/0wkST2C20wStiYOYY6JPOpyO Wj+Hl1fTsIyd6we88+BoxfJaJAeHI9nEKd1Mimie/w== X-Received: by 2002:adf:f2c8:: with SMTP id d8mr16284427wrp.221.1560140670218; Sun, 09 Jun 2019 21:24:30 -0700 (PDT) MIME-Version: 1.0 References: <1559944837-149589-1-git-send-email-fenghua.yu@intel.com> <1559944837-149589-4-git-send-email-fenghua.yu@intel.com> <20190610035302.GA162238@romley-ivt3.sc.intel.com> In-Reply-To: <20190610035302.GA162238@romley-ivt3.sc.intel.com> From: Andy Lutomirski Date: Sun, 9 Jun 2019 21:24:18 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v4 3/5] x86/umwait: Add sysfs interface to control umwait C0.2 state To: Fenghua Yu Cc: Andy Lutomirski , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Ashok Raj , Tony Luck , Ravi V Shankar , linux-kernel , x86 Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jun 9, 2019 at 9:02 PM Fenghua Yu wrote: > > On Sat, Jun 08, 2019 at 03:50:32PM -0700, Andy Lutomirski wrote: > > On Fri, Jun 7, 2019 at 3:10 PM Fenghua Yu wrote: > > > > > > C0.2 state in umwait and tpause instructions can be enabled or disabled > > > on a processor through IA32_UMWAIT_CONTROL MSR register. > > > > > > By default, C0.2 is enabled and the user wait instructions result in > > > lower power consumption with slower wakeup time. > > > > > > But in real time systems which require faster wakeup time although power > > > savings could be smaller, the administrator needs to disable C0.2 and all > > > C0.2 requests from user applications revert to C0.1. > > > > > > A sysfs interface "/sys/devices/system/cpu/umwait_control/enable_c02" is > > > created to allow the administrator to control C0.2 state during run time. > > > > This looks better than the previous version. I think the locking is > > still rather confused. You have a mutex that you hold while changing > > the value, which is entirely reasonable. But, of the code paths that > > write the MSR, only one takes the mutex. > > > > I think you should consider making a function that just does: > > > > wrmsr(MSR_IA32_UMWAIT_CONTROL, READ_ONCE(umwait_control_cached), 0); > > > > and using it in all the places that update the MSR. The only thing > > that should need the lock is the sysfs code to avoid accidentally > > corrupting the value, but that code should also use WRITE_ONCE to do > > its update. > > Based on the comment, the illustrative CPU online and enable_c02 store > functions would be: > > umwait_cpu_online() > { > wrmsr(MSR_IA32_UMWAIT_CONTROL, READ_ONCE(umwait_control_cached), 0); > return 0; > } > > enable_c02_store() > { > mutex_lock(&umwait_lock); > umwait_control_c02 = (u32)!c02_enabled; > WRITE_ONCE(umwait_control_cached, 2 | get_umwait_control_max_time()); > on_each_cpu(umwait_control_msr_update, NULL, 1); > mutex_unlock(&umwait_lock); > } > > Then suppose umwait_control_cached = 100000 initially and only CPU0 is > running. Admin change bit 0 in MSR from 0 to 1 to disable C0.2 and is > onlining CPU1 in the same time: > > 1. On CPU1, read umwait_control_cached to eax as 100000 in > umwait_cpu_online() > 2. On CPU0, write 100001 to umwait_control_cached in enable_c02_store() > 3. On CPU1, wrmsr with eax=100000 in umwaint_cpu_online() > 4. On CPU0, wrmsr with 100001 in enabled_c02_store() > > The result is CPU0 and CPU1 have different MSR values. Yes, but only transiently, because you didn't finish your example. Step 5: enable_c02_store() does on_each_cpu(), and CPU 1 gets updated.