Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp7021767pxv; Fri, 30 Jul 2021 08:12:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7/41DjsYv5G7JtFEJFcENPONQIr9QYCx/Fd9zsxHg8OY70eBet/GqHZQvV70oGFAhWHVJ X-Received: by 2002:a05:6402:124e:: with SMTP id l14mr3653829edw.356.1627657934454; Fri, 30 Jul 2021 08:12:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627657934; cv=none; d=google.com; s=arc-20160816; b=p4OnhI3uTxbiqRN6WutBMsNZH7COJ3gpNfBulAWcG5VTgtFjQOmrJ87+YvyFSX9mYs 2KtrO/KGtMULD64qgzKvsODBUOyZnzEZgdZTyBY769mVgrD2O7ngI6thNXgNHIIv9PtA 8p+yTgVky/AveZkfS5z3U8lCz+BrN5w3LOMgvCzdDGYo85l1tZ/qxTOVHzEfAJJQ61Xo lgwV20SVzv9wTiMo965cAkJ9PcejIC9fpMcWYv3wMQ7wFhO9am3EN/6R5ZZQOrn7yytr GcAxx+0filKdEa+gUuGXsgx6Iy9aX85XiTryxc1Qhy8ZHoSywafTGuY2C2iSq45oiznT hCdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=fjnNfwt7+pHbt9mX4OFLDIg4AHSXj7lenEage+ca32o=; b=i4tLH/rYi+6f9C5X/crpnYApm+7+Ct2KDwoFC2yXEMgIsuGnPO4tBzeHzcFsJlGHmK EEFa/n8nlm0CjqkPA8AtK7Typ/l5oRslBij0F3kZrG75pJwh8xxr3ulxGYeM8uMZtN/X UL9/VD/jYOFrqmzIMyNY1tNk49QlOC3ridvjMIy7engtoP5MnJpMPV8gNIa5v3TSPd8g AlIlb99/BiuhqkUbcSrp4ZWCm+CCYnuUMEtU/oqmj/vRYTMLwtn73D6MmVm29zOBsjM8 PWPfBC8LQ2g8ZsRdO0egaOdvIl+GId2fXI6oW4GB6v+LE7jWqfNOIbC7DYYcy9fHJEkT imug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b23si1991553edt.58.2021.07.30.08.11.50; Fri, 30 Jul 2021 08:12:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239758AbhG3PHX (ORCPT + 99 others); Fri, 30 Jul 2021 11:07:23 -0400 Received: from mga05.intel.com ([192.55.52.43]:52620 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239605AbhG3PGb (ORCPT ); Fri, 30 Jul 2021 11:06:31 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10061"; a="298699144" X-IronPort-AV: E=Sophos;i="5.84,282,1620716400"; d="scan'208";a="298699144" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jul 2021 08:06:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,282,1620716400"; d="scan'208";a="508154972" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by FMSMGA003.fm.intel.com with ESMTP; 30 Jul 2021 08:06:07 -0700 From: "Chang S. Bae" To: bp@suse.de, luto@kernel.org, tglx@linutronix.de, mingo@kernel.org, x86@kernel.org Cc: len.brown@intel.com, dave.hansen@intel.com, thiago.macieira@intel.com, jing2.liu@intel.com, ravi.v.shankar@intel.com, linux-kernel@vger.kernel.org, chang.seok.bae@intel.com Subject: [PATCH v9 22/26] x86/fpu/xstate: Skip writing zeros to signal frame for dynamic user states if in INIT-state Date: Fri, 30 Jul 2021 07:59:53 -0700 Message-Id: <20210730145957.7927-23-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210730145957.7927-1-chang.seok.bae@intel.com> References: <20210730145957.7927-1-chang.seok.bae@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org By default, for XSTATE features in the INIT-state, XSAVE writes zeros to the uncompressed destination buffer. E.g., if you are not using AVX-512, you will still get a bunch of zeros on the signal stack where live AVX-512 data would go. For 'dynamic user state' (currently only XTILEDATA), explicitly skip this data transfer. The result is that the user buffer for the AMX region will not be touched by XSAVE. [ Reading XINUSE takes about 20-30 cycles, but writing zeros consumes about 5-times or more, e.g., for XTILEDATA. ] Signed-off-by: Chang S. Bae Reviewed-by: Len Brown Cc: x86@kernel.org Cc: linux-kernel@vger.kernel.org --- Changes from v5: * Mentioned the optimization trade-offs in the changelog. (Dave Hansen) * Added code comment. Changes from v4: * Added as a new patch. --- arch/x86/include/asm/fpu/internal.h | 38 +++++++++++++++++++++-------- 1 file changed, 28 insertions(+), 10 deletions(-) diff --git a/arch/x86/include/asm/fpu/internal.h b/arch/x86/include/asm/fpu/internal.h index 3b52cfb62ab5..04021f0b7dd7 100644 --- a/arch/x86/include/asm/fpu/internal.h +++ b/arch/x86/include/asm/fpu/internal.h @@ -337,8 +337,9 @@ static inline void os_xrstor(struct xregs_state *xstate, u64 mask) */ static inline int xsave_to_user_sigframe(struct xregs_state __user *buf) { + struct fpu *fpu = ¤t->thread.fpu; u32 lmask, hmask; - u64 mask; + u64 state_mask; int err; /* @@ -346,21 +347,38 @@ static inline int xsave_to_user_sigframe(struct xregs_state __user *buf) * internally, e.g. PKRU. That's user space ABI and also required * to allow the signal handler to modify PKRU. */ - mask = xfeatures_mask_uabi(); + state_mask = xfeatures_mask_uabi(); + + if (!xfeatures_mask_user_dynamic) + goto mask_ready; /* * Exclude dynamic user states for non-opt-in threads. */ - if (xfeatures_mask_user_dynamic) { - struct fpu *fpu = ¤t->thread.fpu; - - mask &= fpu->dynamic_state_perm ? - fpu->state_mask : - ~xfeatures_mask_user_dynamic; + if (!fpu->dynamic_state_perm) { + state_mask &= ~xfeatures_mask_user_dynamic; + } else { + u64 dynamic_state_mask; + + state_mask &= fpu->state_mask; + + dynamic_state_mask = state_mask & xfeatures_mask_user_dynamic; + if (dynamic_state_mask && boot_cpu_has(X86_FEATURE_XGETBV1)) { + u64 dynamic_xinuse, dynamic_init; + u64 xinuse = xgetbv(1); + + dynamic_xinuse = xinuse & dynamic_state_mask; + dynamic_init = ~xinuse & dynamic_state_mask; + if (dynamic_init) { + state_mask &= ~xfeatures_mask_user_dynamic; + state_mask |= dynamic_xinuse; + } + } } - lmask = mask; - hmask = mask >> 32; +mask_ready: + lmask = state_mask; + hmask = state_mask >> 32; /* * Clear the xsave header first, so that reserved fields are -- 2.17.1