Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10870991ybi; Thu, 11 Jul 2019 12:27:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqyT7IbC6rkCULpb5xmLndIlclKJXbsYutfhe2UWyG38fMIPLbYZSEGoI15kCzMxtEWvHqmw X-Received: by 2002:a17:90a:9a95:: with SMTP id e21mr6569059pjp.98.1562873254504; Thu, 11 Jul 2019 12:27:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562873254; cv=none; d=google.com; s=arc-20160816; b=njcNPf1XJQ6opqM8wzohTISpRCMKwCS6QOpWGgpksX/73MLzIBmO3Fxvb8vwdCh7x4 GuNd/aeaoSowX8vvAbfGWwNxEcfa9YVPhskR/NX8EGPJKSA9dctoMs0KNQsgCXYtnPKR +Ks9dJQBv6CUaKD0YysX2k7iDb5GngLBZyYMT7wFbSn6datM+ChJQ80MRM3a3RG62Kmb JjolSta0djWmEtIJpd+V4vxkT0uwBjU77XV9sZ0NcEV//9Asoj9ccwfn0cS65VuhQmnU Zqoq+IeNUYsl/Qz3rYSypgkRdnYZVS8f36mDhQoj2ONKytgBZ4BPlnO1SSHDtvoUMwfq R2pQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=8MQ+WdUsbw85bafIfY5vqhGcvT72hk9+x2VlH4K9nFs=; b=LLIv12pQNrMsAax2TmJH9eTz6LRWxQ0Lop3IFKRjUD3ZEkKGxkdv31W2wpIy0Z3ekH 06yI0tWBe8Lu6a+x8U1ttZG6RU0W8GCgSMsb07vj1GbTmdLnwfx3lHx/JopymmBf5pUh veLEGrkAV3TLDnuySvNhF51cnOzfhjOprf2CkE1oyEADHmKdrMG7WJ530Kjnlf0gDxAk 4CERq2M0g61tU1Iiro7iMNrIp5sntGZHLRde8iK6cx9jm2ohthM9kdfUQgE+kZ6S0NLs O20lUDsse9JlXpjfLk66LgVm7l2Oub4TOXwbChtz8YRASSH5vR5owJNi8B4FQxqYSxRy 1snw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bbqfq59l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 37si6368534pjo.39.2019.07.11.12.27.18; Thu, 11 Jul 2019 12:27:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bbqfq59l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728679AbfGKTAS (ORCPT + 99 others); Thu, 11 Jul 2019 15:00:18 -0400 Received: from mail-io1-f68.google.com ([209.85.166.68]:45682 "EHLO mail-io1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728555AbfGKTAS (ORCPT ); Thu, 11 Jul 2019 15:00:18 -0400 Received: by mail-io1-f68.google.com with SMTP id g20so14842611ioc.12 for ; Thu, 11 Jul 2019 12:00:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8MQ+WdUsbw85bafIfY5vqhGcvT72hk9+x2VlH4K9nFs=; b=bbqfq59lXwLkswsYb1EWpzajlzQMmj6s3ntjMrBCbncKXKjg+/LEZRLqKRic3dB5VO yhZ9BF3srLGsuipoADB9dD+1jeSv0JPuhVC3d8+KDMMuE95N4KUb/VMNAksYwKnafQ/4 Aq1mpndac6ls0mEbhoCj6spdW314CkeR9DiEEWVUO+Qa+OIZB1g0QQNBY8cn5gcYeEYe 4zJH42Cjj09TpCeeW868D+IiuAcfrV8qKjRjB/GlNQQVLTCshPPFiaUWNgnEdsAdIj9Q jHTay489NLEGmLg8CWsysuNBcUUTeRBbDqfFqfPi7MN4uwoBWdjMJ1p+HZCM7Bf0gBpz FVBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8MQ+WdUsbw85bafIfY5vqhGcvT72hk9+x2VlH4K9nFs=; b=kTBYZMcNIYLgffkiboJnf6XXFQq2MPWf7d/ENmCeOOkz5JFVq6lbXjGOFTsdc2J/9P aVvQsmCKGz94ZeXInRw09Hiz0AOHz3pB3XORNMKK+lXeoY+f5Nojt7zDSibAaf/KcYgt xqaj1O/zNsIm9eE9dFbiTRz1+x5RPt7S5wH4vil2XDRQHtISzzPuuNdEoR5ThoFIJD10 LT1BSG/hMcxoRJ1yzLLVHOHT+NFCShKWgqmFOchl/W9AXcn2XFLnJo4Tf/dD3C9Lo2Se Uv0wBDAUx+GWEGy1gwPntffElArPDG9yx2sY2rSB3VY7B+2XFx5ptuzD+WnOUqwN1EeP APwA== X-Gm-Message-State: APjAAAUrCflbGGis0ueeZcUT7DTgKAwbRVmE0h9RWoQGhjlDv/sfHhL7 rwFRvfPK7Nj3OS3ExsmQ6V3yHFgKmEwH0As4A2o= X-Received: by 2002:a5d:9858:: with SMTP id p24mr6201253ios.171.1562871617204; Thu, 11 Jul 2019 12:00:17 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Uros Bizjak Date: Thu, 11 Jul 2019 21:00:06 +0200 Message-ID: Subject: Re: [RFC PATCH, x86]: Disable CPA cache flush for selfsnoop targets To: Andy Lutomirski Cc: Dave Hansen , Peter Zijlstra , LKML , X86 ML , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 11, 2019 at 4:39 PM Andy Lutomirski wrote: > > On Thu, Jul 11, 2019 at 1:13 AM Uros Bizjak wrote: > > > > Recent patch [1] disabled a self-snoop feature on a list of processor > > models with a known errata, so we are confident that the feature > > should work on remaining models also for other purposes than to speed > > up MTRR programming. > > > > I would like to resurrect an old patch [2] that avoids calling clflush > > and wbinvd > > to invalidate caches when CPU supports selfsnoop. > > The big question here is: what are all the reasons that we might need > to flush? Certainly, for stuff like SEV and MKTME, we need to flush > regardless of any self-snoop capability. No AMD target defines self-snoop capability, and set_memory_encrypted forces cache clearing in __set_memory_enc_dec: /* * Before changing the encryption attribute, we need to flush caches. */ cpa_flush(&cpa, 1); Uros.