Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp900570ybv; Wed, 5 Feb 2020 16:55:08 -0800 (PST) X-Google-Smtp-Source: APXvYqwW0VI+Yp7PrP1m1Oj1WkVNzspM6xMlZxphpJ/Xz5YxhR7oMnl0FDyVJWlwCx7PLEFWcNXE X-Received: by 2002:a9d:6045:: with SMTP id v5mr27043236otj.252.1580950508490; Wed, 05 Feb 2020 16:55:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580950508; cv=none; d=google.com; s=arc-20160816; b=h08FsYJxEWIuhx7Rf+a+WaCFuDKU4MghtQ6OWjxyTgU/0optd+4tVVwb4SVTB2fKED Mu5Efhp4EM+uUyA1i3aUvoT7u3J77imU0H/JmJ8jp9DX4f/fsx/ofMtAfLc1r4XYs2Rr C36X4Ls/cxBHQ5CrHfP4Vr/iBf+SRjCZ6Uje3SBfYZxh5l3oJu2E/obJtpIOKWr5+HLm Gyy3f62dUcTJTxw/ZGyTpaM8lFI65kPtjjOpQo6TL2M8dIq/rkOyS0p8a2A1xjeyAoai SCbXoBT9/hbf7Wo4CxFLVOLCTb7lT5P6mnuYrTPi1qnCeiUt2zFzWi9HczjbG+eaxxw/ yDFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=u6EehS4lNjSDLvVYoYZWKDXIMBtP8+WuPr2PFC4bzeQ=; b=0FlFF4sJ5PTXrRz5kAqOs95TE6h1f5cGm2ybU1AmS/2+M6zA2/dOntIPADldY6ZUZy n7QT+SZePJLPD3OVWvg0BiXq95t14lsB9SHGeKKFaOt+CeNy5WPXnzPR3DsP3vTt6qzf fO4s7snelpB2/qoyfVzhcBbArP6x/XrAPoKVTiZZXDXGruAu259x3voGSZ19Wsek1Fr3 79DU2Sin/Y6MabIRiRE99eP/A+1f0Znb+UtTaliVhm6rQ8E6vPbsPz4Sdn5x/FzjTDv4 052vHX35YRL1oP1LNQNWLN91SaFoHVQ6iQwHK0HEW6+FgdB8cIH8ZnUzn6laJYa0TuDh wk8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m26si904143otk.305.2020.02.05.16.54.38; Wed, 05 Feb 2020 16:55:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727541AbgBFAtq (ORCPT + 99 others); Wed, 5 Feb 2020 19:49:46 -0500 Received: from mga11.intel.com ([192.55.52.93]:26572 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727149AbgBFAtq (ORCPT ); Wed, 5 Feb 2020 19:49:46 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Feb 2020 16:49:45 -0800 X-IronPort-AV: E=Sophos;i="5.70,407,1574150400"; d="scan'208";a="430340180" Received: from agluck-desk2.sc.intel.com (HELO agluck-desk2.amr.corp.intel.com) ([10.3.52.68]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Feb 2020 16:49:45 -0800 Date: Wed, 5 Feb 2020 16:49:44 -0800 From: "Luck, Tony" To: Sean Christopherson Cc: Thomas Gleixner , Mark D Rustad , Arvind Sankar , Peter Zijlstra , Ingo Molnar , "Yu, Fenghua" , Ingo Molnar , Borislav Petkov , H Peter Anvin , "Raj, Ashok" , "Shankar, Ravi V" , linux-kernel , x86 Subject: [PATCH] x86/split_lock: Avoid runtime reads of the TEST_CTRL MSR Message-ID: <20200206004944.GA11455@agluck-desk2.amr.corp.intel.com> References: <4E95BFAA-A115-4159-AA4F-6AAB548C6E6C@gmail.com> <8CC9FBA7-D464-4E58-8912-3E14A751D243@gmail.com> <20200126200535.GB30377@agluck-desk2.amr.corp.intel.com> <20200203204155.GE19638@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200203204155.GE19638@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In a context switch from a task that is detecting split locks to one that is not (or vice versa) we need to update the TEST_CTRL MSR. Currently this is done with the common sequence: read the MSR flip the bit write the MSR in order to avoid changing the value of any reserved bits in the MSR. Cache the value of the TEST_CTRL MSR when we read it during initialization so we can avoid an expensive RDMSR instruction during context switch. Suggested-by: Sean Christopherson Signed-off-by: Tony Luck --- arch/x86/kernel/cpu/intel.c | 32 +++++++++++++++++++++++++------- 1 file changed, 25 insertions(+), 7 deletions(-) diff --git a/arch/x86/kernel/cpu/intel.c b/arch/x86/kernel/cpu/intel.c index 5d92e381fd91..78de69c5887a 100644 --- a/arch/x86/kernel/cpu/intel.c +++ b/arch/x86/kernel/cpu/intel.c @@ -1054,6 +1054,14 @@ static void __init split_lock_setup(void) } } +/* + * Soft copy of MSR_TEST_CTRL initialized when we first read the + * MSR. Used at runtime to avoid using rdmsr again just to collect + * the reserved bits in the MSR. We assume reserved bits are the + * same on all CPUs. + */ +static u64 test_ctrl_val; + /* * Locking is not required at the moment because only bit 29 of this * MSR is implemented and locking would not prevent that the operation @@ -1063,19 +1071,29 @@ static void __init split_lock_setup(void) * exist, there may be glitches in virtualization that leave a guest * with an incorrect view of real h/w capabilities. */ -static bool __sld_msr_set(bool on) +static bool __sld_msr_init(void) { - u64 test_ctrl_val; + u64 val; - if (rdmsrl_safe(MSR_TEST_CTRL, &test_ctrl_val)) + if (rdmsrl_safe(MSR_TEST_CTRL, &val)) return false; + test_ctrl_val = val; + + val |= MSR_TEST_CTRL_SPLIT_LOCK_DETECT; + + return !wrmsrl_safe(MSR_TEST_CTRL, val); +} + +static void __sld_msr_set(bool on) +{ + u64 val = test_ctrl_val; if (on) - test_ctrl_val |= MSR_TEST_CTRL_SPLIT_LOCK_DETECT; + val |= MSR_TEST_CTRL_SPLIT_LOCK_DETECT; else - test_ctrl_val &= ~MSR_TEST_CTRL_SPLIT_LOCK_DETECT; + val &= ~MSR_TEST_CTRL_SPLIT_LOCK_DETECT; - return !wrmsrl_safe(MSR_TEST_CTRL, test_ctrl_val); + wrmsrl_safe(MSR_TEST_CTRL, val); } static void split_lock_init(void) @@ -1083,7 +1101,7 @@ static void split_lock_init(void) if (sld_state == sld_off) return; - if (__sld_msr_set(true)) + if (__sld_msr_init()) return; /* -- 2.21.1