From: Mark Rutland <mark.rutland@arm.com>
To: Will Deacon <will@kernel.org>
Cc: linux-arm-kernel@lists.infradead.org, broonie@kernel.org,
catalin.marinas@arm.com, eauger@redhat.com,
eric.auger@redhat.com, fweimer@redhat.com, jeremy.linton@arm.com,
maz@kernel.org, oliver.upton@linux.dev, pbonzini@redhat.com,
stable@vger.kernel.org, tabba@google.com, wilco.dijkstra@arm.com
Subject: Re: [PATCH v2 8/8] KVM: arm64: Eagerly switch ZCR_EL{1,2}
Date: Mon, 10 Feb 2025 17:21:59 +0000 [thread overview]
Message-ID: <Z6o1t7ys2qVaZ-7n@J2N7QTR9R3> (raw)
In-Reply-To: <20250210165325.GI7568@willie-the-truck>
On Mon, Feb 10, 2025 at 04:53:27PM +0000, Will Deacon wrote:
> On Thu, Feb 06, 2025 at 02:11:02PM +0000, Mark Rutland wrote:
> > Fix this and make this a bit easier to reason about by always eagerly
> > switching ZCR_EL{1,2} at hyp during guest<->host transitions. With this
> > happening, there's no need to trap host SVE usage, and the nVHE/nVHVE
>
> nit: nVHVE?
>
> (also, note to Fuad: I think we're trapping FPSIMD/SVE from the host with
> pKVM in Android, so we'll want to fix that when we take this patch via
> -stable)
>
> > __deactivate_cptr_traps() logic can be simplified enable host access to
>
> nit: to enable
>
> > all present FPSIMD/SVE/SME features.
> >
> > In protected nVHE/hVHVE modes, the host's state is always saved/restored
>
> nit: hVHVE
>
> (something tells me these acronyms aren't particularly friendly!)
Aargh, sorry about those -- I've fixed those up and I'll give the series
another once-over.
[...]
> > +static inline void fpsimd_lazy_switch_to_guest(struct kvm_vcpu *vcpu)
> > +{
> > + u64 zcr_el1, zcr_el2;
> > +
> > + if (!guest_owns_fp_regs())
> > + return;
> > +
> > + if (vcpu_has_sve(vcpu)) {
> > + /* A guest hypervisor may restrict the effective max VL. */
> > + if (vcpu_has_nv(vcpu) && !is_hyp_ctxt(vcpu))
> > + zcr_el2 = __vcpu_sys_reg(vcpu, ZCR_EL2);
> > + else
> > + zcr_el2 = vcpu_sve_max_vq(vcpu) - 1;
> > +
> > + write_sysreg_el2(zcr_el2, SYS_ZCR);
> > +
> > + zcr_el1 = __vcpu_sys_reg(vcpu, vcpu_sve_zcr_elx(vcpu));
> > + write_sysreg_el1(zcr_el1, SYS_ZCR);
> > + }
> > +}
> > +
> > +static inline void fpsimd_lazy_switch_to_host(struct kvm_vcpu *vcpu)
> > +{
> > + u64 zcr_el1, zcr_el2;
> > +
> > + if (!guest_owns_fp_regs())
> > + return;
> > +
> > + if (vcpu_has_sve(vcpu)) {
> > + zcr_el1 = read_sysreg_el1(SYS_ZCR);
> > + __vcpu_sys_reg(vcpu, vcpu_sve_zcr_elx(vcpu)) = zcr_el1;
> > +
> > + /*
> > + * The guest's state is always saved using the guest's max VL.
> > + * Ensure that the host has the guest's max VL active such that
> > + * the host can save the guest's state lazily, but don't
> > + * artificially restrict the host to the guest's max VL.
> > + */
> > + if (has_vhe()) {
> > + zcr_el2 = vcpu_sve_max_vq(vcpu) - 1;
> > + write_sysreg_el2(zcr_el2, SYS_ZCR);
> > + } else {
> > + zcr_el2 = sve_vq_from_vl(kvm_host_sve_max_vl) - 1;
> > + write_sysreg_el2(zcr_el2, SYS_ZCR);
> > +
> > + zcr_el1 = vcpu_sve_max_vq(vcpu) - 1;
> > + write_sysreg_el1(zcr_el1, SYS_ZCR);
>
> Do we need an ISB before this to make sure that the CPTR traps have been
> deactivated properly?
Sorry, I had meant to add a comment here that this relies upon a
subtlety that avoids the need for the ISB.
When the guest owns the FP regs here, we know:
* If the guest doesn't have SVE, then we're not poking anything, and so
no ISB is necessary.
* If the guest has SVE, then either:
- The guest owned the FP regs when it was entered.
- The guest *didn't* own the FP regs when it was entered, but acquired
ownership via a trap which executed kvm_hyp_handle_fpsimd().
... and in either case, *after* disabling the traps there's been an
ERET to the guest and an exception back to hyp, either of which
provides the necessary context synchronization such that the traps are
disabled here.
Does that make sense to you?
Mark.
next prev parent reply other threads:[~2025-02-10 19:35 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-02-06 14:10 [PATCH v2 0/8] KVM: arm64: FPSIMD/SVE/SME fixes Mark Rutland
2025-02-06 14:10 ` [PATCH v2 1/8] KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state Mark Rutland
2025-02-07 12:27 ` Will Deacon
2025-02-07 13:21 ` Mark Rutland
2025-02-10 10:53 ` Marc Zyngier
2025-02-10 15:05 ` Will Deacon
2025-02-06 14:10 ` [PATCH v2 2/8] KVM: arm64: Remove host FPSIMD saving for non-protected KVM Mark Rutland
2025-02-10 16:12 ` Will Deacon
2025-02-10 16:59 ` Mark Rutland
2025-02-10 18:06 ` Will Deacon
2025-02-10 20:03 ` Mark Rutland
2025-02-11 19:08 ` Mark Rutland
2025-02-06 14:10 ` [PATCH v2 3/8] KVM: arm64: Remove VHE host restore of CPACR_EL1.ZEN Mark Rutland
2025-02-10 16:14 ` Will Deacon
2025-02-06 14:10 ` [PATCH v2 4/8] KVM: arm64: Remove VHE host restore of CPACR_EL1.SMEN Mark Rutland
2025-02-10 16:16 ` Will Deacon
2025-02-06 14:10 ` [PATCH v2 5/8] KVM: arm64: Refactor CPTR trap deactivation Mark Rutland
2025-02-10 16:34 ` Will Deacon
2025-02-06 14:11 ` [PATCH v2 6/8] KVM: arm64: Refactor exit handlers Mark Rutland
2025-02-10 16:37 ` Will Deacon
2025-02-06 14:11 ` [PATCH v2 7/8] KVM: arm64: Mark some header functions as inline Mark Rutland
2025-02-10 16:39 ` Will Deacon
2025-02-06 14:11 ` [PATCH v2 8/8] KVM: arm64: Eagerly switch ZCR_EL{1,2} Mark Rutland
2025-02-06 19:12 ` Mark Brown
2025-02-07 9:34 ` Mark Rutland
2025-02-10 16:53 ` Will Deacon
2025-02-10 17:21 ` Mark Rutland [this message]
2025-02-10 18:20 ` Will Deacon
2025-02-10 18:56 ` Mark Rutland
2025-02-11 10:29 ` Will Deacon
2025-02-08 0:27 ` [PATCH v2 0/8] KVM: arm64: FPSIMD/SVE/SME fixes Mark Brown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Z6o1t7ys2qVaZ-7n@J2N7QTR9R3 \
--to=mark.rutland@arm.com \
--cc=broonie@kernel.org \
--cc=catalin.marinas@arm.com \
--cc=eauger@redhat.com \
--cc=eric.auger@redhat.com \
--cc=fweimer@redhat.com \
--cc=jeremy.linton@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=maz@kernel.org \
--cc=oliver.upton@linux.dev \
--cc=pbonzini@redhat.com \
--cc=stable@vger.kernel.org \
--cc=tabba@google.com \
--cc=wilco.dijkstra@arm.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox