From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v4 28/40] KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE
Date: Fri, 23 Feb 2018 19:05:12 +0100 [thread overview]
Message-ID: <20180223180512.GE7396@cbox> (raw)
In-Reply-To: <864lmal5lw.wl-marc.zyngier@arm.com>
On Wed, Feb 21, 2018 at 03:33:47PM +0000, Marc Zyngier wrote:
> On Thu, 15 Feb 2018 21:03:20 +0000,
> Christoffer Dall wrote:
> >
> > Some system registers do not affect the host kernel's execution and can
> > therefore be loaded when we are about to run a VCPU and we don't have to
> > restore the host state to the hardware before the time when we are
> > actually about to return to userspace or schedule out the VCPU thread.
> >
> > The EL1 system registers and the userspace state registers only
> > affecting EL0 execution do not need to be saved and restored on every
> > switch between the VM and the host, because they don't affect the host
> > kernel's execution.
> >
> > We mark all registers which are now deffered as such in the
> > vcpu_{read,write}_sys_reg accessors in sys-regs.c to ensure the most
> > up-to-date copy is always accessed.
> >
> > Note MPIDR_EL1 (controlled via VMPIDR_EL2) is accessed from other vcpu
> > threads, for example via the GIC emulation, and therefore must be
> > declared as immediate, which is fine as the guest cannot modify this
> > value.
> >
> > The 32-bit sysregs can also be deferred but we do this in a separate
> > patch as it requires a bit more infrastructure.
> >
> > Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
> > ---
> >
> > Notes:
> > Changes since v3:
> > - Changed to switch-based sysreg approach
> >
> > arch/arm64/kvm/hyp/sysreg-sr.c | 39 +++++++++++++++++++++++++++++++--------
> > arch/arm64/kvm/sys_regs.c | 40 ++++++++++++++++++++++++++++++++++++++++
> > 2 files changed, 71 insertions(+), 8 deletions(-)
> >
> > diff --git a/arch/arm64/kvm/hyp/sysreg-sr.c b/arch/arm64/kvm/hyp/sysreg-sr.c
> > index 906606dc4e2c..9c60b8062724 100644
> > --- a/arch/arm64/kvm/hyp/sysreg-sr.c
> > +++ b/arch/arm64/kvm/hyp/sysreg-sr.c
> > @@ -25,8 +25,12 @@
> > /*
> > * Non-VHE: Both host and guest must save everything.
> > *
> > - * VHE: Host must save tpidr*_el0, mdscr_el1, sp_el0,
> > - * and guest must save everything.
> > + * VHE: Host and guest must save mdscr_el1 and sp_el0 (and the PC and pstate,
> > + * which are handled as part of the el2 return state) on every switch.
> > + * tpidr_el0 and tpidrro_el0 only need to be switched when going
>
> How about suspend/resume, which saves/restores both of these EL0
> registers (see cpu_do_suspend)? We may not need to do anything (either
> because vcpu_put will have happened, or because we'll come back
> exactly where we were), but I'd like to make sure this hasn't been
> overlooked.
>
Interesting question.
AFAICT, cpu_do_suspend preserves the values in these registers, which
means it will either preserve the guest's or user space's values,
depending on when cpu_do_suspend is called. It will be the former if
cpu_do_suspend is called in between vcpu_load and vcpu_put (from
interrupt context, for example), and it will be the latter if called
after the thread goes to sleep for example.
I can't see how suspend can break this. Am I missing something?
> > + * to host userspace or a different VCPU. EL1 registers only need to be
> > + * switched when potentially going to run a different VCPU. The latter two
> > + * classes are handled as part of kvm_arch_vcpu_load and kvm_arch_vcpu_put.
> > */
> >
> > static void __hyp_text __sysreg_save_common_state(struct kvm_cpu_context *ctxt)
> > @@ -93,14 +97,11 @@ void __hyp_text __sysreg_save_state_nvhe(struct kvm_cpu_context *ctxt)
> > void sysreg_save_host_state_vhe(struct kvm_cpu_context *ctxt)
> > {
> > __sysreg_save_common_state(ctxt);
> > - __sysreg_save_user_state(ctxt);
> > }
> >
> > void sysreg_save_guest_state_vhe(struct kvm_cpu_context *ctxt)
> > {
> > - __sysreg_save_el1_state(ctxt);
> > __sysreg_save_common_state(ctxt);
> > - __sysreg_save_user_state(ctxt);
> > __sysreg_save_el2_return_state(ctxt);
> > }
> >
> > @@ -169,14 +170,11 @@ void __hyp_text __sysreg_restore_state_nvhe(struct kvm_cpu_context *ctxt)
> > void sysreg_restore_host_state_vhe(struct kvm_cpu_context *ctxt)
> > {
> > __sysreg_restore_common_state(ctxt);
> > - __sysreg_restore_user_state(ctxt);
> > }
> >
> > void sysreg_restore_guest_state_vhe(struct kvm_cpu_context *ctxt)
> > {
> > - __sysreg_restore_el1_state(ctxt);
> > __sysreg_restore_common_state(ctxt);
> > - __sysreg_restore_user_state(ctxt);
> > __sysreg_restore_el2_return_state(ctxt);
> > }
> >
> > @@ -240,6 +238,18 @@ void __hyp_text __sysreg32_restore_state(struct kvm_vcpu *vcpu)
> > */
> > void kvm_vcpu_load_sysregs(struct kvm_vcpu *vcpu)
> > {
> > + struct kvm_cpu_context *host_ctxt = vcpu->arch.host_cpu_context;
> > + struct kvm_cpu_context *guest_ctxt = &vcpu->arch.ctxt;
> > +
> > + if (!has_vhe())
> > + return;
> > +
> > + __sysreg_save_user_state(host_ctxt);
> > +
> > + __sysreg_restore_user_state(guest_ctxt);
> > + __sysreg_restore_el1_state(guest_ctxt);
> > +
> > + vcpu->arch.sysregs_loaded_on_cpu = true;
> > }
> >
> > /**
> > @@ -255,6 +265,19 @@ void kvm_vcpu_load_sysregs(struct kvm_vcpu *vcpu)
> > */
> > void kvm_vcpu_put_sysregs(struct kvm_vcpu *vcpu)
> > {
> > + struct kvm_cpu_context *host_ctxt = vcpu->arch.host_cpu_context;
> > + struct kvm_cpu_context *guest_ctxt = &vcpu->arch.ctxt;
> > +
> > + if (!has_vhe())
> > + return;
> > +
> > + __sysreg_save_el1_state(guest_ctxt);
> > + __sysreg_save_user_state(guest_ctxt);
> > +
> > + /* Restore host user state */
> > + __sysreg_restore_user_state(host_ctxt);
> > +
> > + vcpu->arch.sysregs_loaded_on_cpu = false;
> > }
> >
> > void __hyp_text __kvm_set_tpidr_el2(u64 tpidr_el2)
> > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> > index b3c3f014aa61..f060309337aa 100644
> > --- a/arch/arm64/kvm/sys_regs.c
> > +++ b/arch/arm64/kvm/sys_regs.c
> > @@ -87,6 +87,26 @@ u64 vcpu_read_sys_reg(struct kvm_vcpu *vcpu, int reg)
> > * exit from the guest but are only saved on vcpu_put.
> > */
> > switch (reg) {
> > + case CSSELR_EL1: return read_sysreg_s(SYS_CSSELR_EL1);
> > + case SCTLR_EL1: return read_sysreg_s(sctlr_EL12);
> > + case ACTLR_EL1: return read_sysreg_s(SYS_ACTLR_EL1);
> > + case CPACR_EL1: return read_sysreg_s(cpacr_EL12);
> > + case TTBR0_EL1: return read_sysreg_s(ttbr0_EL12);
> > + case TTBR1_EL1: return read_sysreg_s(ttbr1_EL12);
> > + case TCR_EL1: return read_sysreg_s(tcr_EL12);
> > + case ESR_EL1: return read_sysreg_s(esr_EL12);
> > + case AFSR0_EL1: return read_sysreg_s(afsr0_EL12);
> > + case AFSR1_EL1: return read_sysreg_s(afsr1_EL12);
> > + case FAR_EL1: return read_sysreg_s(far_EL12);
> > + case MAIR_EL1: return read_sysreg_s(mair_EL12);
> > + case VBAR_EL1: return read_sysreg_s(vbar_EL12);
> > + case CONTEXTIDR_EL1: return read_sysreg_s(contextidr_EL12);
> > + case TPIDR_EL0: return read_sysreg_s(SYS_TPIDR_EL0);
> > + case TPIDRRO_EL0: return read_sysreg_s(SYS_TPIDRRO_EL0);
> > + case TPIDR_EL1: return read_sysreg_s(SYS_TPIDR_EL1);
> > + case AMAIR_EL1: return read_sysreg_s(amair_EL12);
> > + case CNTKCTL_EL1: return read_sysreg_s(cntkctl_EL12);
> > + case PAR_EL1: return read_sysreg_s(SYS_PAR_EL1);
> > }
> >
> > immediate_read:
> > @@ -103,6 +123,26 @@ void vcpu_write_sys_reg(struct kvm_vcpu *vcpu, int reg, u64 val)
> > * entry to the guest but are only restored on vcpu_load.
> > */
> > switch (reg) {
> > + case CSSELR_EL1: write_sysreg_s(val, SYS_CSSELR_EL1); return;
> > + case SCTLR_EL1: write_sysreg_s(val, sctlr_EL12); return;
> > + case ACTLR_EL1: write_sysreg_s(val, SYS_ACTLR_EL1); return;
> > + case CPACR_EL1: write_sysreg_s(val, cpacr_EL12); return;
> > + case TTBR0_EL1: write_sysreg_s(val, ttbr0_EL12); return;
> > + case TTBR1_EL1: write_sysreg_s(val, ttbr1_EL12); return;
> > + case TCR_EL1: write_sysreg_s(val, tcr_EL12); return;
> > + case ESR_EL1: write_sysreg_s(val, esr_EL12); return;
> > + case AFSR0_EL1: write_sysreg_s(val, afsr0_EL12); return;
> > + case AFSR1_EL1: write_sysreg_s(val, afsr1_EL12); return;
> > + case FAR_EL1: write_sysreg_s(val, far_EL12); return;
> > + case MAIR_EL1: write_sysreg_s(val, mair_EL12); return;
> > + case VBAR_EL1: write_sysreg_s(val, vbar_EL12); return;
> > + case CONTEXTIDR_EL1: write_sysreg_s(val, contextidr_EL12); return;
> > + case TPIDR_EL0: write_sysreg_s(val, SYS_TPIDR_EL0); return;
> > + case TPIDRRO_EL0: write_sysreg_s(val, SYS_TPIDRRO_EL0); return;
> > + case TPIDR_EL1: write_sysreg_s(val, SYS_TPIDR_EL1); return;
> > + case AMAIR_EL1: write_sysreg_s(val, amair_EL12); return;
> > + case CNTKCTL_EL1: write_sysreg_s(val, cntkctl_EL12); return;
> > + case PAR_EL1: write_sysreg_s(val, SYS_PAR_EL1); return;
> > }
> >
> > immediate_write:
> > --
> > 2.14.2
> >
>
> Looks good to me otherwise.
>
Thanks,
-Christoffer
next prev parent reply other threads:[~2018-02-23 18:05 UTC|newest]
Thread overview: 138+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-02-15 21:02 [PATCH v4 00/40] Optimize KVM/ARM for VHE systems Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 01/40] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN Christoffer Dall
2018-02-21 9:32 ` Marc Zyngier
2018-02-21 17:05 ` Andrew Jones
2018-02-15 21:02 ` [PATCH v4 02/40] KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init Christoffer Dall
2018-02-21 11:05 ` Marc Zyngier
2018-02-15 21:02 ` [PATCH v4 03/40] KVM: arm64: Avoid storing the vcpu pointer on the stack Christoffer Dall
2018-02-19 15:50 ` Julien Grall
2018-02-22 8:43 ` Christoffer Dall
2018-02-21 11:34 ` Marc Zyngier
2018-02-22 9:02 ` Christoffer Dall
2018-02-22 9:35 ` Marc Zyngier
2018-02-22 9:49 ` Andrew Jones
2018-02-21 17:32 ` Andrew Jones
2018-02-22 9:10 ` Christoffer Dall
2018-02-22 9:56 ` Andrew Jones
2018-02-22 10:24 ` Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 04/40] KVM: arm64: Rework hyp_panic for VHE and non-VHE Christoffer Dall
2018-02-21 17:32 ` Andrew Jones
2018-02-15 21:02 ` [PATCH v4 05/40] KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 06/40] KVM: arm/arm64: Get rid of vcpu->arch.irq_lines Christoffer Dall
2018-02-15 21:02 ` [PATCH v4 07/40] KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 08/40] KVM: arm/arm64: Introduce vcpu_el1_is_32bit Christoffer Dall
2018-02-21 12:05 ` Marc Zyngier
2018-02-22 9:11 ` Christoffer Dall
2018-02-21 17:34 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 09/40] KVM: arm64: Move debug dirty flag calculation out of world switch Christoffer Dall
2018-02-21 17:35 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 10/40] KVM: arm64: Slightly improve debug save/restore functions Christoffer Dall
2018-02-21 17:39 ` Andrew Jones
2018-02-21 17:52 ` Marc Zyngier
2018-02-22 8:05 ` Andrew Jones
2018-02-24 18:32 ` Christoffer Dall
2018-02-24 20:16 ` Marc Zyngier
2018-02-15 21:03 ` [PATCH v4 11/40] KVM: arm64: Improve debug register save/restore flow Christoffer Dall
2018-02-21 17:40 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 12/40] KVM: arm64: Factor out fault info population and gic workarounds Christoffer Dall
2018-02-21 17:41 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 13/40] KVM: arm64: Introduce VHE-specific kvm_vcpu_run Christoffer Dall
2018-02-21 17:43 ` Andrew Jones
2018-02-21 18:18 ` Andrew Jones
2018-02-22 9:16 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 14/40] KVM: arm64: Remove kern_hyp_va() use in VHE switch function Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 15/40] KVM: arm64: Don't deactivate VM on VHE systems Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 16/40] KVM: arm64: Remove noop calls to timer save/restore from VHE switch Christoffer Dall
2018-02-21 17:43 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 17/40] KVM: arm64: Move userspace system registers into separate function Christoffer Dall
2018-02-19 17:21 ` Julien Grall
2018-02-22 9:18 ` Christoffer Dall
2018-02-21 12:21 ` Marc Zyngier
2018-02-15 21:03 ` [PATCH v4 18/40] KVM: arm64: Rewrite sysreg alternatives to static keys Christoffer Dall
2018-02-21 17:44 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 19/40] KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 20/40] KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe Christoffer Dall
2018-02-21 17:47 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 21/40] KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 22/40] KVM: arm64: Don't save the host ELR_EL2 and SPSR_EL2 on VHE systems Christoffer Dall
2018-02-21 17:49 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 23/40] KVM: arm64: Change 32-bit handling of VM system registers Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 24/40] KVM: arm64: Rewrite system register accessors to read/write functions Christoffer Dall
2018-02-19 18:12 ` Julien Grall
2018-02-22 9:18 ` Christoffer Dall
2018-02-21 13:32 ` Marc Zyngier
2018-02-22 9:22 ` Christoffer Dall
2018-02-22 10:48 ` Marc Zyngier
2018-02-22 11:10 ` Christoffer Dall
2018-02-22 13:26 ` Marc Zyngier
2018-02-22 13:34 ` Andrew Jones
2018-02-22 14:35 ` Christoffer Dall
2018-02-22 15:11 ` Andrew Jones
2018-02-22 15:58 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 25/40] KVM: arm64: Introduce framework for accessing deferred sysregs Christoffer Dall
2018-02-21 14:16 ` Marc Zyngier
2018-02-22 13:40 ` Andrew Jones
2018-02-22 14:56 ` Christoffer Dall
2018-02-22 17:40 ` Julien Grall
2018-02-15 21:03 ` [PATCH v4 26/40] KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 Christoffer Dall
2018-02-21 14:47 ` Marc Zyngier
2018-02-22 9:25 ` Christoffer Dall
2018-02-22 13:49 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 27/40] KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 Christoffer Dall
2018-02-21 15:08 ` Marc Zyngier
2018-02-22 13:51 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 28/40] KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE Christoffer Dall
2018-02-21 15:33 ` Marc Zyngier
2018-02-23 18:05 ` Christoffer Dall [this message]
2018-02-22 14:04 ` Andrew Jones
2018-02-22 18:30 ` Julien Grall
2018-02-22 18:31 ` Julien Grall
2018-02-22 19:49 ` Christoffer Dall
2018-02-22 19:48 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 29/40] KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers Christoffer Dall
2018-02-21 15:44 ` Marc Zyngier
2018-02-22 14:30 ` Andrew Jones
2018-02-23 11:35 ` Julien Grall
2018-02-15 21:03 ` [PATCH v4 30/40] KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put Christoffer Dall
2018-02-21 16:27 ` Marc Zyngier
2018-02-22 18:15 ` Christoffer Dall
2018-02-22 14:35 ` Andrew Jones
2018-02-22 14:58 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 31/40] KVM: arm64: Move common VHE/non-VHE trap config in separate functions Christoffer Dall
2018-02-21 17:59 ` Marc Zyngier
2018-02-22 18:17 ` Christoffer Dall
2018-02-25 21:27 ` Christoffer Dall
2018-02-22 15:34 ` Andrew Jones
2018-02-23 14:30 ` Julien Grall
2018-02-23 17:48 ` Christoffer Dall
2018-02-25 21:29 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 32/40] KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions Christoffer Dall
2018-02-21 18:11 ` Marc Zyngier
2018-02-22 15:38 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 33/40] KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE Christoffer Dall
2018-02-21 18:20 ` Marc Zyngier
2018-02-22 18:57 ` Christoffer Dall
2018-02-22 15:51 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 34/40] KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE Christoffer Dall
2018-02-21 18:26 ` Marc Zyngier
2018-02-22 19:04 ` Christoffer Dall
2018-02-22 15:54 ` Andrew Jones
2018-02-15 21:03 ` [PATCH v4 35/40] KVM: arm/arm64: Get rid of vgic_elrsr Christoffer Dall
2018-02-22 9:45 ` Marc Zyngier
2018-02-23 14:44 ` Julien Grall
2018-02-23 17:50 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 36/40] KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 37/40] KVM: arm/arm64: Move arm64-only vgic-v2-sr.c file to arm64 Christoffer Dall
2018-02-22 12:33 ` Marc Zyngier
2018-02-22 14:37 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 38/40] KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE Christoffer Dall
2018-02-22 12:32 ` Marc Zyngier
2018-02-22 14:42 ` Christoffer Dall
2018-02-22 15:01 ` Marc Zyngier
2018-02-22 16:02 ` Christoffer Dall
2018-02-22 17:21 ` Marc Zyngier
2018-02-22 19:28 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 39/40] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load Christoffer Dall
2018-02-22 13:11 ` Marc Zyngier
2018-02-22 14:44 ` Christoffer Dall
2018-02-15 21:03 ` [PATCH v4 40/40] KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180223180512.GE7396@cbox \
--to=christoffer.dall@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).