Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4611561ybi; Mon, 15 Jul 2019 11:43:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqyw27Im+Rodso6U1JAtcWYEBaErXWmY5L3whaFwvnmkwytxbcVdJH1UUbLnWuVJs9YAgYEd X-Received: by 2002:a17:90a:1c17:: with SMTP id s23mr31051670pjs.108.1563216198572; Mon, 15 Jul 2019 11:43:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563216198; cv=none; d=google.com; s=arc-20160816; b=qim/scVw+rGgLkR6uxOFfHy9T1PvlDfOg7EodhLphh33si0afYXvo+DsEI8Spq30yz TcbIMOqjFpOBuf+laJfI3F8sSoQDJXC+tsiOrCC/H8Be0mTWsIR9KCj0GONiu7kUesu+ lQ9DzN9IO4vbAvZtQIyBf2tHW7mrSwMAB3OFuuGYtczjaGia2eihTn1cohVujrtDzxvL fYBjjgpcsod9ITts46I92CsaQRIGpBxyCqkfUfMWLCIogvqTs1QnPwLZC1Jk2qH+AxhA BegWmAqG+vOIqL0xYzgOCSrALb3aTk795Ur2mA1kO3IIAm1ALYeFB5xxrAu0fvgYuuds I6HQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=EdQWyMImigNJDxg/alD00phJqGFc2N9GH2MAPVG+AYI=; b=IKBJqOvmDxNiX/q3KKunGwz3C7FZZpLH19MwuIeR6cdD+f7ArrUik2sMdCxNWwgcA/ 1tDhUVkfDmG50b6umUxKvsdRGVEct1AIz3SOrt9y7xfGaPHjdTEN2uFnVXFU1piN98CN UIvDelFATAdLFtGhR0cmYkLz1NUAkfqSZIo0czAyl77QDX847T0dh7rB8sG/bM7HP0Yk UAwFKTS2xQTQx324IMcrhCQq9GCGkLSCjonk3Xs2lgWr1DtfohHQ7KUsd6LmsurB/Edh aWgYVCIhiuUpGEzaFMeZUB+43S9Yl8VM8vm8O8h8/QleqLcLT8a++/leNC52+xzdp1e3 pM1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k43si16780349pje.59.2019.07.15.11.43.02; Mon, 15 Jul 2019 11:43:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729595AbfGOSlK (ORCPT + 99 others); Mon, 15 Jul 2019 14:41:10 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:48507 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729503AbfGOSlK (ORCPT ); Mon, 15 Jul 2019 14:41:10 -0400 Received: from pd9ef1cb8.dip0.t-ipconnect.de ([217.239.28.184] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1hn5uN-0003zm-5u; Mon, 15 Jul 2019 20:41:07 +0200 Date: Mon, 15 Jul 2019 20:41:01 +0200 (CEST) From: Thomas Gleixner To: Andi Kleen cc: Uros Bizjak , linux-kernel@vger.kernel.org, x86@kernel.org, Andrew Lutomirski Subject: Re: [RFC PATCH, x86]: Disable CPA cache flush for selfsnoop targets In-Reply-To: <8736j7gsza.fsf@linux.intel.com> Message-ID: References: <8736j7gsza.fsf@linux.intel.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 15 Jul 2019, Andi Kleen wrote: > Uros Bizjak writes: > > > Recent patch [1] disabled a self-snoop feature on a list of processor > > models with a known errata, so we are confident that the feature > > should work on remaining models also for other purposes than to speed > > up MTRR programming. > > MTRR is very different than TLBs. > > >From my understanding not flushing with PAT is only safe everywhere when > the memory is only used for coherent devices (like the Internal GPU on > Intel CPUs). We don't have any infrastructure to track or enforce > this unfortunately. Right, we don't know where the PAT invocation comes from and whether they are safe to omit flushing the cache. The module load code would be one obvious candidate. But unless there is some really worthwhile speedup, e.g. for boot, then adding some flag to let CPA know about the safe 'no flush' operation might be not worth it. Thanks, tglx