Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp393677pxb; Wed, 20 Jan 2021 09:26:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJxMcV3LqrJHBj6WC8QSqaz6JiV7n+92K7jTL3Zsx0yQEdbzzdc/ferbiNeN/4ez9a8hVgI5 X-Received: by 2002:a05:6402:54d:: with SMTP id i13mr2253811edx.12.1611163599530; Wed, 20 Jan 2021 09:26:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611163599; cv=none; d=google.com; s=arc-20160816; b=Z6yqh4/5tET8svYi8so8vPgXMcIW7evMeo0Ak0b4fElABA/sB5+LWnz7Kw6v/y9oXa x9k1QpP95qASbA0I1YgikkabiYdzPa+6/bjV4uFB0UCbyx0pJlUa+LQrV1u0ygd+o5Oz KncZ9VdVpcNos45aIHSVOUAE/kT4CJp8SitOPpcsEWmWdnecWfni7HWUJtZP9Vxa7tXl qotzU3zeWDrkxIxz2lxiYaTHKhIBXRSPM/IZAz9rEjI78ImZvQyLNuZZojfU1pVSt8e3 Tj1pHNBtR1d0fk9cBDlk27WAJPDWM3fj2iL16fH0kx9p3Sf2dfg4YBsHfB/qyC5EQzrT qmPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=6q+1nCKUwXJYk5MQnmDoYds2X8n2WT2g+kFbmJsrAyY=; b=Z4SSGNKziHvcTVJg9BERHNa39ctqybJqUaZx4nBwPsmwJCr2eS2HcQCqVFJZZvbxT/ 1rLCrSRegsEF2jvhTOYKxx8MEJ9gGVU//16KDhf2rizfaUwMPu+bu1SXhsglZse9FXRf Te35OlviVd4veDmwR4+pAvrsvsGBODydFsHOXdt+f2HsQXapB8KBmxLWmN8VpRTVMQ3O 3iOQfpwQkFEfDTUSkPVWTWik4o8XILqz+g0R0qTTO43yqySWy8URcptg0jbxdQBpk+Pp J0H2lI4D3FgYhv2OmZjak1HwjtpSEeO80Pzmkfgwuq7z76WC/tTQSpRdtrdxpA/oCAk1 vU9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id me16si860657ejb.615.2021.01.20.09.25.57; Wed, 20 Jan 2021 09:26:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727190AbhATRWt (ORCPT + 99 others); Wed, 20 Jan 2021 12:22:49 -0500 Received: from foss.arm.com ([217.140.110.172]:40710 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387613AbhATPpk (ORCPT ); Wed, 20 Jan 2021 10:45:40 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 2976631B; Wed, 20 Jan 2021 07:44:41 -0800 (PST) Received: from arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7882E3F68F; Wed, 20 Jan 2021 07:44:39 -0800 (PST) Date: Wed, 20 Jan 2021 15:44:23 +0000 From: Dave Martin To: Ard Biesheuvel Cc: Herbert Xu , Peter Zijlstra , Catalin Marinas , Sebastian Andrzej Siewior , Linux Kernel Mailing List , Eric Biggers , Mark Brown , Linux Crypto Mailing List , Thomas Gleixner , Will Deacon , Ingo Molnar , Linux ARM Subject: Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled Message-ID: <20210120154422.GB1684@arm.com> References: <20201218170106.23280-1-ardb@kernel.org> <20201218170106.23280-5-ardb@kernel.org> <20210119160045.GA1684@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jan 19, 2021 at 05:29:05PM +0100, Ard Biesheuvel wrote: > On Tue, 19 Jan 2021 at 17:01, Dave Martin wrote: > > > > On Fri, Dec 18, 2020 at 06:01:05PM +0100, Ard Biesheuvel wrote: > > > Kernel mode NEON can be used in task or softirq context, but only in > > > a non-nesting manner, i.e., softirq context is only permitted if the > > > interrupt was not taken at a point where the kernel was using the NEON > > > in task context. > > > > > > This means all users of kernel mode NEON have to be aware of this > > > limitation, and either need to provide scalar fallbacks that may be much > > > slower (up to 20x for AES instructions) and potentially less safe, or > > > use an asynchronous interface that defers processing to a later time > > > when the NEON is guaranteed to be available. > > > > > > Given that grabbing and releasing the NEON is cheap, we can relax this > > > restriction, by increasing the granularity of kernel mode NEON code, and > > > always disabling softirq processing while the NEON is being used in task > > > context. > > > > > > Signed-off-by: Ard Biesheuvel > > > > Sorry for the slow reply on this... it looks reasonable, but I have a > > few comments below. > > > > No worries - thanks for taking a look. > > > > --- > > > arch/arm64/include/asm/assembler.h | 19 +++++++++++++------ > > > arch/arm64/kernel/asm-offsets.c | 2 ++ > > > arch/arm64/kernel/fpsimd.c | 4 ++-- > > > 3 files changed, 17 insertions(+), 8 deletions(-) > > > > > > diff --git a/arch/arm64/include/asm/assembler.h b/arch/arm64/include/asm/assembler.h > > > index ddbe6bf00e33..74ce46ed55ac 100644 > > > --- a/arch/arm64/include/asm/assembler.h > > > +++ b/arch/arm64/include/asm/assembler.h > > > @@ -15,6 +15,7 @@ > > > #include > > > > > > #include > > > +#include > > > #include > > > #include > > > #include > > > @@ -717,17 +718,23 @@ USER(\label, ic ivau, \tmp2) // invalidate I line PoU > > > .endm > > > > > > .macro if_will_cond_yield_neon > > > -#ifdef CONFIG_PREEMPTION > > > get_current_task x0 > > > ldr x0, [x0, #TSK_TI_PREEMPT] > > > - sub x0, x0, #PREEMPT_DISABLE_OFFSET > > > - cbz x0, .Lyield_\@ > > > +#ifdef CONFIG_PREEMPTION > > > + cmp x0, #PREEMPT_DISABLE_OFFSET > > > + beq .Lyield_\@ // yield on need_resched in task context > > > +#endif > > > + /* never yield while serving a softirq */ > > > + tbnz x0, #SOFTIRQ_SHIFT, .Lnoyield_\@ > > > > Can you explain the rationale here? > > > > Using if_will_cond_yield_neon suggests the algo thinks it may run for > > too long the stall preemption until completion, but we happily stall > > preemption _and_ softirqs here. > > > > Is it actually a bug to use the NEON conditional yield helpers in > > softirq context? > > > > No, it is not. But calling kernel_neon_end() from softirq context will > not cause it to finish any faster, so there is really no point in > doing so. > > > Ideally, if processing in softirq context takes an unreasonable about of > > time, the work would be handed off to an asynchronous worker, but that > > does seem to conflict rather with the purpose of this series... > > > > Agreed, but this is not something we can police at this level. If the > caller does an unreasonable amount of work from a softirq, no amount > of yielding is going to make a difference. Ack, just wanted to make sure I wasn't missing something. Anyone writing softirq code can starve preemption, so I agree that we should trust people to know what they're doing. > > > + > > > + adr_l x0, irq_stat + IRQ_CPUSTAT_SOFTIRQ_PENDING > > > + this_cpu_offset x1 > > > + ldr w0, [x0, x1] > > > + cbnz w0, .Lyield_\@ // yield on pending softirq in task context > > > +.Lnoyield_\@: > > > /* fall through to endif_yield_neon */ > > > .subsection 1 > > > .Lyield_\@ : > > > -#else > > > - .section ".discard.cond_yield_neon", "ax" > > > -#endif > > > .endm > > > > > > .macro do_cond_yield_neon > > > diff --git a/arch/arm64/kernel/asm-offsets.c b/arch/arm64/kernel/asm-offsets.c > > > index 7d32fc959b1a..34ef70877de4 100644 > > > --- a/arch/arm64/kernel/asm-offsets.c > > > +++ b/arch/arm64/kernel/asm-offsets.c > > > @@ -93,6 +93,8 @@ int main(void) > > > DEFINE(DMA_FROM_DEVICE, DMA_FROM_DEVICE); > > > BLANK(); > > > DEFINE(PREEMPT_DISABLE_OFFSET, PREEMPT_DISABLE_OFFSET); > > > + DEFINE(SOFTIRQ_SHIFT, SOFTIRQ_SHIFT); > > > + DEFINE(IRQ_CPUSTAT_SOFTIRQ_PENDING, offsetof(irq_cpustat_t, __softirq_pending)); > > > BLANK(); > > > DEFINE(CPU_BOOT_STACK, offsetof(struct secondary_data, stack)); > > > DEFINE(CPU_BOOT_TASK, offsetof(struct secondary_data, task)); > > > diff --git a/arch/arm64/kernel/fpsimd.c b/arch/arm64/kernel/fpsimd.c > > > index 062b21f30f94..823e3a8a8871 100644 > > > --- a/arch/arm64/kernel/fpsimd.c > > > +++ b/arch/arm64/kernel/fpsimd.c > > > @@ -180,7 +180,7 @@ static void __get_cpu_fpsimd_context(void) > > > */ > > > static void get_cpu_fpsimd_context(void) > > > { > > > - preempt_disable(); > > > + local_bh_disable(); > > > __get_cpu_fpsimd_context(); > > > } > > > > > > @@ -201,7 +201,7 @@ static void __put_cpu_fpsimd_context(void) > > > static void put_cpu_fpsimd_context(void) > > > { > > > __put_cpu_fpsimd_context(); > > > - preempt_enable(); > > > + local_bh_enable(); > > > } > > > > > > static bool have_cpu_fpsimd_context(void) > > > > I was concerned about catching all the relevant preempt_disable()s, but > > it had slipped my memory that Julien had factored these into one place. > > > > I can't see off the top of my head any reason why this shouldn't work. > > > > Thanks. > > > > > In threory, switching to local_bh_enable() here will add a check for > > pending softirqs onto context handling fast paths. I haven't dug into > > how that works, so perhaps this is trivial on top of the preemption > > check in preempt_enable(). Do you see any difference in hackbench or > > similar benchmarks? > > > > I haven't tried, tbh. But by context handling fast paths, you mean > managing the FP/SIMD state at context switch time, right? Checking for > pending softirqs amounts to a single per-CPU load plus compare, so > that should be negligible AFAICT. Obviously, actually handling the Yes. I've tended to assume, rather than prove, that this kind of thing is negligible -- so I confess I had not attempted to measure these effects when writing the original code. > softirq may take additional time, but that penalty has to be taken > somewhere - I don't see how that would create extra work that we > wouldn't have to do otherwise. > > I'll do some experiments with hackbench once I get back to this series. That sounds fine. Probably you won't find a significant difference anyway. Cheers ---Dave