From: Marc Zyngier <maz@kernel.org>
To: Mark Brown <broonie@kernel.org>
Cc: Oliver Upton <oliver.upton@linux.dev>,
Joey Gouly <joey.gouly@arm.com>,
Catalin Marinas <catalin.marinas@arm.com>,
Suzuki K Poulose <suzuki.poulose@arm.com>,
Will Deacon <will@kernel.org>,
Paolo Bonzini <pbonzini@redhat.com>,
Jonathan Corbet <corbet@lwn.net>, Shuah Khan <shuah@kernel.org>,
Dave Martin <Dave.Martin@arm.com>, Fuad Tabba <tabba@google.com>,
Mark Rutland <mark.rutland@arm.com>,
linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org
Subject: Re: [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests
Date: Mon, 17 Feb 2025 09:37:26 +0000 [thread overview]
Message-ID: <86h64ssyi1.wl-maz@kernel.org> (raw)
In-Reply-To: <Z69dsGn1JVWPCqAi@finisterre.sirena.org.uk>
On Fri, 14 Feb 2025 15:13:52 +0000,
Mark Brown <broonie@kernel.org> wrote:
>
> On Fri, Feb 14, 2025 at 09:24:03AM +0000, Marc Zyngier wrote:
> > Mark Brown <broonie@kernel.org> wrote:
>
> > Just to be clear: I do not intend to review a series that doesn't
> > cover the full gamut of KVM from day 1. Protected mode is an absolute
> > requirement. It is the largest KVM deployment, and Android phones the
> > only commonly available platform with SME. If CCA gets merged prior to
> > SME support, supporting it will also be a requirement.
>
> OK, no problem. This is a new requirement and I'd been trying to
> balance the concerns people have with the size of serieses like this
> with the need to get everything in, my plan had been to follow up as
> soon as possible with pKVM.
If size is an issue, split the UAPI from the core code. But don't
fragment the overall world switch and exception handling, because
that's a sure way to end-up with the same sort of problems we ended up
fixing in SVE. pKVM has a direct influence on what you track, where
you track it, and implementing it as an afterthought is a very bad
idea.
>
> > > Access to the floating point registers follows the architecture:
>
> > > - When both SVE and SME are present:
> > > - If PSTATE.SM == 0 the vector length used for the Z and P registers
> > > is the SVE vector length.
> > > - If PSTATE.SM == 1 the vector length used for the Z and P registers
> > > is the SME vector length.
> > > - If only SME is present:
> > > - If PSTATE.SM == 0 the Z and P registers are inaccessible and the
> > > floating point state accessed via the encodings for the V registers.
> > > - If PSTATE.SM == 1 the vector length used for the Z and P registers
> > > - The SME specific ZA and ZT0 registers are only accessible if SVCR.ZA is 1.
>
> > > The VMM must understand this, in particular when loading state SVCR
> > > should be configured before other state.
>
> > Why SVCR? This isn't a register, just an architected accessor to
> > PSTATE.{ZA,SM}. Userspace already has direct access to PSTATE, so I
> > don't understand this requirement.
>
> Could you be more explicit as to what you mean by direct access to
> PSTATE here? The direct access to these PSTATE fields is in the form of
> SVCR register accesses, or writes via SMSTART or SMSTOP instructions
> when executing code - is there another access mechanism I'm not aware of
> here? They don't appear in SPSR. Or is this a terminology issue with
> referring to SVCR as the mechanism for configuring PSTATE.{SM,ZA}
> without explicitly calling out that that's what's happening?
I'm painfully aware of the architecture limitations.
However, I don't get your mention of SPSR here. The architecture is
quite clear that PSTATE is where these bits are held, that they are
not propagated anywhere else, and that's where userspace should expect
to find them.
The fact that SW must use SVCR to alter PSTATE.{ZA,SM} doesn't matter.
We save/restore registers, not accessors. If this means we need to
play a dance when the VMM accesses PSTATE to reconciliate KVM's
internal view with the userspace view, so be it.
It probably means you need to obtain a clarification of the
architecture to define *where* these bits are stored in PSTATE,
because that's not currently defined.
>
> > Isn't it that there is simply a dependency between restoring PSTATE
> > and any of the vector stuff? Also, how do you preserve the current ABI
> > that do not have this requirement?
>
> Yes, that's the dependency - I'm spelling out explicitly what changes in
> the register view when PSTATE.{SM,ZA} are restored. This ABI is what
> you appeared to be asking for the last time we discussed this.
> Previously I had also proposed either:
>
> - Exposing the streaming mode view of the register state as separate
> registers, selecting between the standard and streaming views for
> load/save based on the mode when the guest runs and clearing the
> inactive registers on userspace access.
>
> - Always presenting userspace with the largest available vector length,
> zero padding when userspace reads and discarding unused high bits
> when loading into the registers for the guest. This ends up
> requiring rewriting between VLs, or to/from FPSIMD format, around
> periods of userspace access since when normally executing and context
> switching the guest we want to store the data in the native format
> for the current PSTATE.SM for performance.
>
> both of which largely avoid the ordering requirements but add complexity
> to the implementation, and memory overhead in the first case. I'd
> originally implemented the second case, that seems the best of the
> available options to me. You weren't happy with these options and said
> that we should not translate register formats and always use the current
> mode for the vCPU, but given that changing PSTATE.SM changes the
> register sizes that ends up creating an ordering requirement. You
> seemed to agree that it was reasonable to have an ordering requirement
> with PSTATE.SM so long as it only came when SME had been explicitly
> enabled.
>
> Would you prefer:
>
> - Changing the register view based on the current value of PSTATE.SM.
> - Exposing streaming mode Z and P as separate registers.
> - Exposing the existing Z and P registers with the maximum S?E VL.
>
> or some other option?
My take on this hasn't changed. I want to see something that behaves
*exactly* like the architecture defines the expected behaviour of a
CPU.
But you still haven't answered my question: How is the *current* ABI
preserved? Does it require *not* selecting SME? Does it require
anything else? I'm expecting simple answers to simple questions, not a
wall of text describing something that is not emulating the
architecture.
M.
--
Without deviation from the norm, progress is not possible.
next prev parent reply other threads:[~2025-02-17 9:37 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-02-14 1:57 [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests Mark Brown
2025-02-14 1:57 ` [PATCH v4 01/27] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state Mark Brown
2025-02-14 1:57 ` [PATCH v4 02/27] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time Mark Brown
2025-02-14 1:57 ` [PATCH v4 03/27] arm64/fpsimd: Check enable bit for FA64 when saving EFI state Mark Brown
2025-02-14 1:57 ` [PATCH v4 04/27] arm64/fpsimd: Determine maximum virtualisable SME vector length Mark Brown
2025-02-14 1:57 ` [PATCH v4 05/27] KVM: arm64: Introduce non-UNDEF FGT control Mark Brown
2025-02-14 1:57 ` [PATCH v4 06/27] KVM: arm64: Pay attention to FFR parameter in SVE save and load Mark Brown
2025-02-14 1:57 ` [PATCH v4 07/27] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h Mark Brown
2025-02-14 1:57 ` [PATCH v4 08/27] KVM: arm64: Move SVE state access macros after feature test macros Mark Brown
2025-02-14 1:57 ` [PATCH v4 09/27] KVM: arm64: Rename SVE finalization constants to be more general Mark Brown
2025-02-14 1:57 ` [PATCH v4 10/27] KVM: arm64: Document the KVM ABI for SME Mark Brown
2025-02-14 1:57 ` [PATCH v4 11/27] KVM: arm64: Define internal features " Mark Brown
2025-02-14 1:57 ` [PATCH v4 12/27] KVM: arm64: Rename sve_state_reg_region Mark Brown
2025-02-14 1:57 ` [PATCH v4 13/27] KVM: arm64: Store vector lengths in an array Mark Brown
2025-02-14 1:57 ` [PATCH v4 14/27] KVM: arm64: Implement SME vector length configuration Mark Brown
2025-02-14 1:57 ` [PATCH v4 15/27] KVM: arm64: Support SME control registers Mark Brown
2025-02-14 1:57 ` [PATCH v4 16/27] KVM: arm64: Support TPIDR2_EL0 Mark Brown
2025-02-14 1:58 ` [PATCH v4 17/27] KVM: arm64: Support SME identification registers for guests Mark Brown
2025-02-14 1:58 ` [PATCH v4 18/27] KVM: arm64: Support SME priority registers Mark Brown
2025-02-14 1:58 ` [PATCH v4 19/27] KVM: arm64: Provide assembly for SME state restore Mark Brown
2025-02-14 1:58 ` [PATCH v4 20/27] KVM: arm64: Support userspace access to streaming mode Z and P registers Mark Brown
2025-02-14 1:58 ` [PATCH v4 21/27] KVM: arm64: Expose SME specific state to userspace Mark Brown
2025-02-14 1:58 ` [PATCH v4 22/27] KVM: arm64: Context switch SME state for normal guests Mark Brown
2025-02-14 1:58 ` [PATCH v4 23/27] KVM: arm64: Handle SME exceptions Mark Brown
2025-02-14 1:58 ` [PATCH v4 24/27] KVM: arm64: Expose SME to nested guests Mark Brown
2025-02-14 1:58 ` [PATCH v4 25/27] KVM: arm64: Provide interface for configuring and enabling SME for guests Mark Brown
2025-02-14 1:58 ` [PATCH v4 26/27] KVM: arm64: selftests: Add SME system registers to get-reg-list Mark Brown
2025-02-14 1:58 ` [PATCH v4 27/27] KVM: arm64: selftests: Add SME to set_id_regs test Mark Brown
2025-02-14 9:24 ` [PATCH v4 00/27] KVM: arm64: Implement support for SME in non-protected guests Marc Zyngier
2025-02-14 15:13 ` Mark Brown
2025-02-17 9:37 ` Marc Zyngier [this message]
2025-02-18 22:54 ` Mark Brown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=86h64ssyi1.wl-maz@kernel.org \
--to=maz@kernel.org \
--cc=Dave.Martin@arm.com \
--cc=broonie@kernel.org \
--cc=catalin.marinas@arm.com \
--cc=corbet@lwn.net \
--cc=joey.gouly@arm.com \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.linux.dev \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=oliver.upton@linux.dev \
--cc=pbonzini@redhat.com \
--cc=shuah@kernel.org \
--cc=suzuki.poulose@arm.com \
--cc=tabba@google.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).