Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2622319pxb; Sun, 17 Oct 2021 20:46:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzor7hrZQKLIDi/U9fkNTWd/9nPcIRi+2aPTOgTBRDkKZRbjrlin8DeoIaqzhuaJQERPPMt X-Received: by 2002:a63:6c89:: with SMTP id h131mr21141756pgc.47.1634528817202; Sun, 17 Oct 2021 20:46:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634528817; cv=none; d=google.com; s=arc-20160816; b=Nxr3y0T6LBjIdD4PGPqAjh8SkIQ0ibvB7iVhXifqRO2KTPBlbEtHxYETedMCHwTaPM A7C0NrdO37wGdK5UNElogU1KYBAUaBUWoG3sx0aBdfvWTQ5zeSto5jZusWFi0KUxyb6e 5kce4rWGPaJKpZPlabEGszGUc+MPPB+Z7bb7SVARdBCxZ6hypsu2G2BBdLz4aWSPe85y vaNXB14QZxNJ739BHjnAOHrwqMxR8D9bDJubpunzQO9M7295IhMqrW7HXQKOLwvci/UD 9jx8cqz7ymUG0YHdO0jP2L4ox6m8Fg/DRqlYkGXd0DqILXf2D9lwTD/QI7be4smRrsRl A/jQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:date:mime-version:references:subject:cc:to:from :dkim-signature:dkim-signature:message-id; bh=fCFzDxx+rtFO71q7DC7PDNDesiOaduHYPNleUvpo0zg=; b=Lg7E9vmp+KVtoBJddcP7tZd9de3zVcn51ALAlF8zoCQRLuLob7yrI6nYWvbHK+rVPG eALcoMWj4A86o8ZO28mFHgq/SaY7PQJF36+X3P69EaHIM8WCThCjHi/pRTqISNKKgaGb GNJm/JFzQMY2BSSkrUu+cl3Qd+uEVWCt0SkRBWeQuoKov81y/KNv0MvmJ2lfvrsuDnVb l+UhVOMrQBKvrogRp0kAQmDdELdDOyQ4iQdaI9rzYS6D4YWKz0B4bS/Mfc65oClJH1nn vOfVeXvq4CUe0VEzofnAq/puPEE8zhEoB29jESBqsmsAYdNZyLMowS15PLCha3aJYtjt f5Zg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=261+IMZP; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=jMdC7Psl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f9si15894655plg.33.2021.10.17.20.46.44; Sun, 17 Oct 2021 20:46:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=261+IMZP; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=jMdC7Psl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344322AbhJQRF3 (ORCPT + 98 others); Sun, 17 Oct 2021 13:05:29 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:33416 "EHLO galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231863AbhJQRF0 (ORCPT ); Sun, 17 Oct 2021 13:05:26 -0400 Message-ID: <20211017152048.604360568@linutronix.de> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1634490196; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: references:references; bh=fCFzDxx+rtFO71q7DC7PDNDesiOaduHYPNleUvpo0zg=; b=261+IMZPSjK8BzD4TYD9/psrMt0sO8rqvrfTwz1fBJxTSQmLVZs0sWVaoX4YCU1oEK7SIs 2ea9KR2KA2SxgIfpQYhyZuFZgCPHK9ggc207f9zeojN7uqTfyZ3fy5VNW83re92ozSk1ln AsxGs3VrpIs2Nup95yukytbpkxVnv8B/oLskrNyzUheZFUMSs8NsZk+ysN/nBLmdju8yAF P+62IS+n2NwqIOonTlsgS6An+6uYn8fc8aWuHng7aHRbXl1Pt4HxrFBJTsnp9f6nFY1cmH KA8fByi1y7VkbMvcUrFKAQnh4oShEXcSEF2VcIifiUZDszqs23bDOzyUScW+0Q== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1634490196; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: references:references; bh=fCFzDxx+rtFO71q7DC7PDNDesiOaduHYPNleUvpo0zg=; b=jMdC7Pslut39EL2YrfNClwsriWn8bNQWnBkO+JQazrj075T4lHg2/tnMq31MXSABjNkKW8 qZehr77O3jonSECw== From: Thomas Gleixner To: LKML Cc: x86@kernel.org, "Liu, Jing2" , Paolo Bonzini , "Bae, Chang Seok" , Dave Hansen , Arjan van de Ven , kvm@vger.kernel.org, "Nakajima, Jun" , Sean Christopherson Subject: [patch 2/4] x86/fpu: Provide infrastructure for KVM FPU cleanup References: <20211017151447.829495362@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Date: Sun, 17 Oct 2021 19:03:15 +0200 (CEST) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For the upcoming AMX support it's necessary to do a proper integration with KVM. Currently KVM allocates two FPU structs which are used for saving the user state of the vCPU thread and restoring the guest state when entering vcpu_run() and doing the reverse operation before leaving vcpu_run(). With the new fpstate mechanism this can be reduced to one extra buffer by swapping the fpstate pointer in current::thread::fpu. This makes the upcoming support for AMX and XFD simpler because then fpstate information (features, sizes, xfd) are always consistent and it does not require any nasty workarounds. Provide: - An allocator which initializes the state properly - A replacement for the existing FPU swap mechanim Aside of the reduced memory foot print, this also makes state switching more efficient when TIF_FPU_NEED_LOAD is set. It does not require a memcpy as the state is already correct in the to be swapped out fpstate. The existing interfaces will be removed once KVM is converted over. Signed-off-by: Thomas Gleixner --- arch/x86/include/asm/fpu/api.h | 13 ++++++- arch/x86/kernel/fpu/core.c | 88 ++++++++++++++++++++++++++++++++++++++++--- 2 files changed, 95 insertions(+), 6 deletions(-) --- diff --git a/arch/x86/include/asm/fpu/api.h b/arch/x86/include/asm/fpu/api.h index 9ce83148058f..3b018140b3ae 100644 --- a/arch/x86/include/asm/fpu/api.h +++ b/arch/x86/include/asm/fpu/api.h @@ -135,9 +135,22 @@ extern void fpu_init_fpstate_user(struct fpu *fpu); extern void fpstate_clear_xstate_component(struct fpstate *fps, unsigned int xfeature); /* KVM specific functions */ +extern bool fpu_alloc_guest_fpstate(struct fpu_guest *gfpu); +extern void fpu_free_guest_fpstate(struct fpu_guest *gfpu); +extern int fpu_swap_kvm_fpstate(struct fpu_guest *gfpu, bool enter_guest, u64 restore_mask); extern void fpu_swap_kvm_fpu(struct fpu *save, struct fpu *rstor, u64 restore_mask); extern int fpu_copy_kvm_uabi_to_fpstate(struct fpu *fpu, const void *buf, u64 xcr0, u32 *pkru); extern void fpu_copy_fpstate_to_kvm_uabi(struct fpu *fpu, void *buf, unsigned int size, u32 pkru); +static inline void fpstate_set_confidential(struct fpu_guest *gfpu) +{ + gfpu->fpstate->is_confidential = true; +} + +static inline bool fpstate_is_confidential(struct fpu_guest *gfpu) +{ + return gfpu->fpstate->is_confidential; +} + #endif /* _ASM_X86_FPU_API_H */ diff --git a/arch/x86/kernel/fpu/core.c b/arch/x86/kernel/fpu/core.c index c23574905a33..d4c16bb37144 100644 --- a/arch/x86/kernel/fpu/core.c +++ b/arch/x86/kernel/fpu/core.c @@ -176,6 +176,78 @@ void fpu_reset_from_exception_fixup(void) } #if IS_ENABLED(CONFIG_KVM) +static void __fpstate_reset(struct fpstate *fpstate); + +bool fpu_alloc_guest_fpstate(struct fpu_guest *gfpu) +{ + struct fpstate *fpstate; + unsigned int size; + + size = fpu_user_cfg.default_size + ALIGN(offsetof(struct fpstate, regs), 64); + fpstate = vzalloc(size); + if (!fpstate) + return false; + + __fpstate_reset(fpstate); + fpstate_init_user(fpstate); + fpstate->is_valloc = true; + fpstate->is_guest = true; + + gfpu->fpstate = fpstate; + return true; +} +EXPORT_SYMBOL_GPL(fpu_alloc_guest_fpstate); + +void fpu_free_guest_fpstate(struct fpu_guest *gfpu) +{ + struct fpstate *fps = gfpu->fpstate; + + if (!fps) + return; + + if (WARN_ON_ONCE(!fps->is_valloc || !fps->is_guest || fps->in_use)) + return; + + gfpu->fpstate = NULL; + vfree(fps); +} +EXPORT_SYMBOL_GPL(fpu_free_guest_fpstate); + +int fpu_swap_kvm_fpstate(struct fpu_guest *guest_fpu, bool enter_guest, + u64 restore_mask) +{ + struct fpstate *guest_fps = guest_fpu->fpstate; + struct fpu *fpu = ¤t->thread.fpu; + struct fpstate *cur_fps = fpu->fpstate; + + fpregs_lock(); + if (!cur_fps->is_confidential && !test_thread_flag(TIF_NEED_FPU_LOAD)) + save_fpregs_to_fpstate(fpu); + + /* Swap fpstate */ + if (enter_guest) { + fpu->__task_fpstate = cur_fps; + fpu->fpstate = guest_fps; + guest_fps->in_use = true; + } else { + guest_fps->in_use = false; + fpu->fpstate = fpu->__task_fpstate; + fpu->__task_fpstate = NULL; + } + + cur_fps = fpu->fpstate; + + if (!cur_fps->is_confidential) { + restore_mask &= XFEATURE_MASK_FPSTATE; + restore_fpregs_from_fpstate(cur_fps, restore_mask); + } + + fpregs_mark_activate(); + fpregs_unlock(); + return 0; +} +EXPORT_SYMBOL_GPL(fpu_swap_kvm_fpstate); + void fpu_swap_kvm_fpu(struct fpu *save, struct fpu *rstor, u64 restore_mask) { fpregs_lock(); @@ -352,16 +424,20 @@ void fpstate_init_user(struct fpstate *fpstate) fpstate_init_fstate(fpstate); } +static void __fpstate_reset(struct fpstate *fpstate) +{ + /* Initialize sizes and feature masks */ + fpstate->size = fpu_kernel_cfg.default_size; + fpstate->user_size = fpu_user_cfg.default_size; + fpstate->xfeatures = fpu_kernel_cfg.default_features; + fpstate->user_xfeatures = fpu_user_cfg.default_features; +} + void fpstate_reset(struct fpu *fpu) { /* Set the fpstate pointer to the default fpstate */ fpu->fpstate = &fpu->__fpstate; - - /* Initialize sizes and feature masks */ - fpu->fpstate->size = fpu_kernel_cfg.default_size; - fpu->fpstate->user_size = fpu_user_cfg.default_size; - fpu->fpstate->xfeatures = fpu_kernel_cfg.default_features; - fpu->fpstate->user_xfeatures = fpu_user_cfg.default_features; + __fpstate_reset(fpu->fpstate); } #if IS_ENABLED(CONFIG_KVM)