[PATCH v2 11/28] arm64/sve: Core task context handling
Catalin Marinas
catalin.marinas at arm.com
Fri Oct 6 06:36:40 PDT 2017
On Fri, Oct 06, 2017 at 02:10:09PM +0100, Dave P Martin wrote:
> On Thu, Oct 05, 2017 at 12:28:35PM +0100, Catalin Marinas wrote:
> > On Tue, Oct 03, 2017 at 12:33:03PM +0100, Dave P Martin wrote:
> > > TIF_FOREIGN_FPSTATE's meaning is expanded to cover SVE, but otherwise
> > > unchanged:
> > >
> > > * If a task is running and !TIF_FOREIGN_FPSTATE, then the the CPU
> > > registers of the CPU the task is running on contain the authoritative
> > > FPSIMD/SVE state of the task. The backing memory may be stale.
> > >
> > > * Otherwise (i.e., task not running, or task running and
> > > TIF_FOREIGN_FPSTATE), the task's FPSIMD/SVE backing memory is
> > > authoritative. If additionally per_cpu(fpsimd_last_state,
> > > task->fpsimd_state.cpu) == &task->fpsimd_state.cpu, then
> > > task->fpsimd_state.cpu's registers are also up to date for task, but
> > > not authorititive: the current FPSIMD/SVE state may be read from
> > > them, but they must not be written.
> > >
> > > The FPSIMD/SVE backing memory is selected by TIF_SVE:
> > >
> > > * TIF_SVE set: Zn (incorporating Vn in bits[127:0]), Pn and FFR are
> > > stored in task->thread.sve_state, formatted appropriately for vector
> > > length task->thread.sve_vl. task->thread.sve_state must point to a
> > > valid buffer at least sve_state_size(task) bytes in size.
"Zn [...] stored in task->thread.sve_state" - is this still true with
the changes you proposed? I guess even without these changes, you have
situations where the hardware regs are out of sync with sve_state (see
more below).
> > > * TIF_SVE clear: Vn are stored in task->fpsimd_state; Zn[max : 128] are
> > > logically zero[*] but not stored anywhere; Pn, FFR are not stored and
> > > have unspecified values from userspace's point of view.
> > > task->thread.sve_state does not need to be non-null, valid or any
> > > particular size: it must not be dereferenced.
> > >
> > > In practice I don't exploit the "unspecifiedness" much. The Zn high
> > > bits, Pn and FFR are all zeroed when setting TIF_SVE again:
> > > sve_alloc() is the common path for this.
> > >
> > > * FPSR and FPCR are always stored in task->fpsimd_state irrespctive of
> > > whether TIF_SVE is clear or set, since these are not vector length
> > > dependent.
[...]
> > Just wondering, as an optimisation for do_sve_acc() - instead of
> > sve_alloc() and fpsimd_to_sve(), can we not force the loading of the
> > FPSIMD regs on the return to user via TIF_FOREIGN_FPSTATE? This would
> > ensure the zeroing of the top SVE bits and we only need to allocate the
> > SVE state on the saving path. This means enabling SVE for user and
> > setting TIF_SVE without having the backing storage allocated.
>
> Currently the set of places where the "TIF_SVE implies sve_state valid"
> assumption is applied is not very constrained, so while your suggestion
> is reasonable I'd rather not mess with it just now, if possible.
>
>
> But we can do this (which is what my current fixup has):
>
> el0_sve_acc:
> enable_dbg_and_irq
> // ...
> bl do_sve_acc
> b ret_to_user
>
> void do_sve_acc(unsigned int esr, struct pt_regs *regs)
> {
> /* Even if we chose not to use SVE, the hardware could still trap: */
> if (unlikely(!system_supports_sve()) || WARN_ON(is_compat_task())) {
> force_signal_inject(SIGILL, ILL_ILLOPC, regs, 0);
> return;
> }
>
> sve_alloc(current);
>
> local_bh_disable();
> if (test_and_clear_thread_flag(TIF_FOREIGN_FPSTATE)) {
> task_fpsimd_load(); /* flushes high Zn bits as a side-effect */
> sve_flush_pregs();
> } else {
> sve_flush_all(); /* flush all the SVE bits in-place */
> }
>
> if (test_and_set_thread_flag(TIF_SVE))
> WARN_ON(1); /* SVE access shouldn't have trapped */
> local_bh_enable();
> }
>
> where sve_flush_all() zeroes all the high Zn bits via a series of
> MOV Vn, Vn instructions, and also zeroes Pn and FFR. sve_fplush_pregs()
> just does the latter.
This looks fine to me but I added a comment above. IIUC, we can now have
TIF_SVE set while sve_state contains stale data. I don't see an issue
given that every time you enter the kernel from user space you have
TIF_SVE set and the sve_state storage out of sync. Maybe tweak the
TIF_SVE description above slightly.
--
Catalin
More information about the linux-arm-kernel
mailing list