Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3090615ybi; Mon, 17 Jun 2019 16:23:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqxl6Mvs/BnnORGrSa0nCsF/kWO2jBX9R8fyPSsWdLdM4UxN2xq4HnzKZK/dTh+Zb3PHsWPa X-Received: by 2002:a17:902:8bc1:: with SMTP id r1mr18715817plo.42.1560813814537; Mon, 17 Jun 2019 16:23:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560813814; cv=none; d=google.com; s=arc-20160816; b=Xr+LjUanjetNdbzqd6PrEm+BcRFZP1igjlKy9vbt4QmiUFQvpKQCVEe6HqpXTLumt9 szZQJVL/JM8UxmozFNcoXiVlia0NvV+hdhzzHj/kHbE4sb1xkV24XPKrUpw0z1uBPoe/ w8KVfZVfrB9CIQ0RAkzC1fQrzsTFWwy+yB3JWDewAJzvi1MBQiDqHFSksUvS6mvgUOBa /J1LnTAUbTc0yxY55i+9MxcL8VV/80FP8KSehKCzoDOna0dC66VGgRtK1CmsF7wGSF1t E1qjlutxqcO8b+m/ByPaXdrO7SPyfs+59MWtK9rMyCwgxND5X84Y0bbouLoEDJJbZ2DN KvIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=1l89NsSdbl5EoX4LgSfqi/S8e4jk5TvrMxan2h6mhqU=; b=P8RXmIQBxg9YjVEQzJXABa1b+cMkHBo5OxLXbALu9V6NHfTaogvDRsaHO+mm7V/8kb dJYG/J8fvDwNJktDvINhKtCcnHU8g2H7cmDlNXBNx8tLFh5/fCLDNH8Mv54VEzqExbLj GMJvzpzQBDXy6oN6SCgUgSDgudDDyC/s1vudANXVIvwh1br9txtN9t4ngdrZbJfKuX2c FiVrEYIBD4To7/UIRFRCIkmWpNFBx/eErRPD+XXFHuNSZtyFWL7+wXUb4kFkxbLkUTGQ FWLW2vuRQhkpyXN9XrGa2wrDgJTclME4705Edtyd8RPan6kFpkNbTlHFPQJ2+T2obg3s wEGQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j190si9739132pge.83.2019.06.17.16.23.19; Mon, 17 Jun 2019 16:23:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727399AbfFQXVx (ORCPT + 99 others); Mon, 17 Jun 2019 19:21:53 -0400 Received: from mga09.intel.com ([134.134.136.24]:60596 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726121AbfFQXVx (ORCPT ); Mon, 17 Jun 2019 19:21:53 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Jun 2019 16:20:35 -0700 X-ExtLoop1: 1 Received: from romley-ivt3.sc.intel.com ([172.25.110.60]) by fmsmga005.fm.intel.com with ESMTP; 17 Jun 2019 16:20:35 -0700 Date: Mon, 17 Jun 2019 16:11:04 -0700 From: Fenghua Yu To: Andy Lutomirski Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Ashok Raj , Tony Luck , Ravi V Shankar , linux-kernel , x86 Subject: Re: [PATCH v4 3/5] x86/umwait: Add sysfs interface to control umwait C0.2 state Message-ID: <20190617231104.GF217081@romley-ivt3.sc.intel.com> References: <1559944837-149589-1-git-send-email-fenghua.yu@intel.com> <1559944837-149589-4-git-send-email-fenghua.yu@intel.com> <20190610035302.GA162238@romley-ivt3.sc.intel.com> <20190610060234.GD162238@romley-ivt3.sc.intel.com> <20190617202702.GB217081@romley-ivt3.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 17, 2019 at 04:02:50PM -0700, Andy Lutomirski wrote: > On Mon, Jun 17, 2019 at 1:36 PM Fenghua Yu wrote: > > > > On Mon, Jun 10, 2019 at 06:41:31AM -0700, Andy Lutomirski wrote: > > > > > > > > > > On Jun 9, 2019, at 11:02 PM, Fenghua Yu wrote: > > > > > > > >> On Sun, Jun 09, 2019 at 09:24:18PM -0700, Andy Lutomirski wrote: > > > >>> On Sun, Jun 9, 2019 at 9:02 PM Fenghua Yu wrote: > > > >>> > > > >>>> On Sat, Jun 08, 2019 at 03:50:32PM -0700, Andy Lutomirski wrote: > > > >>>>> On Fri, Jun 7, 2019 at 3:10 PM Fenghua Yu wrote: > > > >>>>> > > > >>>>> C0.2 state in umwait and tpause instructions can be enabled or disabled > > > >>>>> on a processor through IA32_UMWAIT_CONTROL MSR register. > > > >>>>> > > > >>>>> By default, C0.2 is enabled and the user wait instructions result in > > > >>>>> lower power consumption with slower wakeup time. > > > >>>>> > > > >>>>> But in real time systems which require faster wakeup time although power > > > >>>>> savings could be smaller, the administrator needs to disable C0.2 and all > > > >>>>> C0.2 requests from user applications revert to C0.1. > > > >>>>> > > > >>>>> A sysfs interface "/sys/devices/system/cpu/umwait_control/enable_c02" is > > > >>>>> created to allow the administrator to control C0.2 state during run time. > > > >>>> > > > >>>> This looks better than the previous version. I think the locking is > > > >>>> still rather confused. You have a mutex that you hold while changing > > > >>>> the value, which is entirely reasonable. But, of the code paths that > > > >>>> write the MSR, only one takes the mutex. > > > >>>> > > > >>>> I think you should consider making a function that just does: > > > >>>> > > > >>>> wrmsr(MSR_IA32_UMWAIT_CONTROL, READ_ONCE(umwait_control_cached), 0); > > > >>>> > > > >>>> and using it in all the places that update the MSR. The only thing > > > >>>> that should need the lock is the sysfs code to avoid accidentally > > > >>>> corrupting the value, but that code should also use WRITE_ONCE to do > > > >>>> its update. > > > >>> > > > >>> Based on the comment, the illustrative CPU online and enable_c02 store > > > >>> functions would be: > > > >>> > > > >>> umwait_cpu_online() > > > >>> { > > > >>> wrmsr(MSR_IA32_UMWAIT_CONTROL, READ_ONCE(umwait_control_cached), 0); > > > >>> return 0; > > > >>> } > > > >>> > > > >>> enable_c02_store() > > > >>> { > > > >>> mutex_lock(&umwait_lock); > > > >>> umwait_control_c02 = (u32)!c02_enabled; > > > >>> WRITE_ONCE(umwait_control_cached, 2 | get_umwait_control_max_time()); > > > >>> on_each_cpu(umwait_control_msr_update, NULL, 1); > > > >>> mutex_unlock(&umwait_lock); > > > >>> } > > > >>> > > > >>> Then suppose umwait_control_cached = 100000 initially and only CPU0 is > > > >>> running. Admin change bit 0 in MSR from 0 to 1 to disable C0.2 and is > > > >>> onlining CPU1 in the same time: > > > >>> > > > >>> 1. On CPU1, read umwait_control_cached to eax as 100000 in > > > >>> umwait_cpu_online() > > > >>> 2. On CPU0, write 100001 to umwait_control_cached in enable_c02_store() > > > >>> 3. On CPU1, wrmsr with eax=100000 in umwaint_cpu_online() > > > >>> 4. On CPU0, wrmsr with 100001 in enabled_c02_store() > > > >>> > > > >>> The result is CPU0 and CPU1 have different MSR values. > > > >> > > > >> Yes, but only transiently, because you didn't finish your example. > > > >> > > > >> Step 5: enable_c02_store() does on_each_cpu(), and CPU 1 gets updated. > > > > > > > > There is no sync on wrmsr on CPU0 and CPU1. > > > > > > What do you mean by sync? > > > > > > > So a better sequence to > > > > describe the problem is changing the order of wrmsr: > > > > > > > > 1. On CPU1, read umwait_control_cached to eax as 100000 in > > > > umwait_cpu_online() > > > > 2. On CPU0, write 100001 to umwait_control_cached in enable_c02_store() > > > > 3. On CPU0, wrmsr with 100001 in on_each_cpu() in enabled_c02_store() > > > > 4. On CPU1, wrmsr with eax=100000 in umwaint_cpu_online() > > > > > > > > So CPU1 and CPU0 have different MSR values. This won't be transient. > > > > > > You are still ignoring the wrmsr on CPU1 due to on_each_cpu(). > > > > > > > Initially umwait_control_cached is 100000 and CPU0 is online while CPU1 > > is going to be online: > > > > 1. On CPU1, cpu_online_mask=0x3 in start_secondary() > > 2. On CPU1, read umwait_control_cached to eax as 100000 in umwait_cpu_online() > > 3. On CPU0, write 100001 to umwait_control_cached in enable_c02_store() > > 4. On CPU0, execute one_each_cpu() in enabled_c02_store(): > > wrmsr with 100001 on CPU0 > > wrmsr with 100001 on CPU1 > > 5. On CPU1, wrmsr with eax=100000 in umwaint_cpu_online() > > > > So the MSR is 100000 on CPU1 and 100001 on CPU0. The MSRs are different on > > the CPUs. > > > > Is this a right sequence to demonstrate locking issue without the mutex > > locking? > > > > Fair enough. I would fix it differently, though: > > static void update_this_cpu_umwait_msr(void) > { > WARN_ON_ONCE(!irqs_disabled()); /* or local_irq_save() */ > > /* We need to prevent umwait_control from being changed *and* > completing its WRMSR between our read and our WRMSR. By turning IRQs > off here, we ensure that no sysfs write happens on this CPU and we > also make sure that any concurrent sysfs write from a different CPU > will not finish updating us via IPI until we're done. */ > wrmsrl(MSR_..., READ_ONCE(umwait_control), 0); > } If no other objections, then I will keep the current mutex lock/unlock to protect wrmsr and the umwait_control_cached variable. Thanks. -Fenghua