All of lore.kernel.org
 help / color / mirror / Atom feed
From: Marc Zyngier <marc.zyngier@arm.com>
To: Christoffer Dall <christoffer.dall@linaro.org>
Cc: linux-kernel@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	kvmarm@lists.cs.columbia.edu,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Peter Maydell <peter.maydell@linaro.org>,
	Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	Mark Rutland <mark.rutland@arm.com>,
	Robin Murphy <robin.murphy@arm.com>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Andrew Jones <drjones@redhat.com>,
	Hanjun Guo <guohanjun@huawei.com>,
	Jayachandran C <jnair@caviumnetworks.com>,
	Jon Masters <jcm@redhat.com>,
	Russell King - ARM Linux <linux@armlinux.org.uk>
Subject: Re: [PATCH v3 12/18] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Date: Mon, 5 Feb 2018 09:08:31 +0000	[thread overview]
Message-ID: <1d30fe51-22dd-6938-2f8f-c823858a3bbd@arm.com> (raw)
In-Reply-To: <20180204183907.GP21802@cbox>

On 04/02/18 18:39, Christoffer Dall wrote:
> On Thu, Feb 01, 2018 at 11:46:51AM +0000, Marc Zyngier wrote:
>> We want SMCCC_ARCH_WORKAROUND_1 to be fast. As fast as possible.
>> So let's intercept it as early as we can by testing for the
>> function call number as soon as we've identified a HVC call
>> coming from the guest.
> 
> Hmmm.  How often is this expected to happen and what is the expected
> extra cost of doing the early-exit handling in the C code vs. here?

Pretty often. On each context switch of a Linux guest, for example. It
is almost as bad as if we were trapping all VM ops. Moving it to C is
definitely visible on something like hackbench (I remember something
like a 10-12% degradation on Seattle, but I'd need to rerun the tests to
give you something accurate). It is the whole GPR save/restore dance
that costs us a lot (31 registers for the guest, 12 for the host), plus
some the extra SError synchronization that doesn't come for free either.

> I think we'd be better off if we only had a single early-exit path (and
> we should move the FP/SIMD trap to that path as well), but if there's a
> measurable benefit of having this logic in assembly as opposed to in the
> C code, then I'm ok with this as well.

I agree that the multiplication of "earlier than early" paths is
becoming annoying. Moving the FP/SIMD stuff to C would be less
problematic, as we have patches to move some of that to load/put, and
we'd only take the trap once per time slice (as opposed to once per
entry at the moment).

Here, we're trying hard to do exactly nothing, because each instruction
is just an extra overhead (we've already nuked the BP). I even
considered inserting that code as part of the per-CPU-type vectors (and
leave the rest of the KVM code alone), but it felt like a step too far.

> The code in this patch looks fine otherwise.

Thanks,

	M.
-- 
Jazz is not dead. It just smells funny...

WARNING: multiple messages have this Message-ID (diff)
From: Marc Zyngier <marc.zyngier@arm.com>
To: Christoffer Dall <christoffer.dall@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>,
	Peter Maydell <peter.maydell@linaro.org>,
	Andrew Jones <drjones@redhat.com>,
	Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>,
	Jon Masters <jcm@redhat.com>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	linux-kernel@vger.kernel.org,
	Russell King - ARM Linux <linux@armlinux.org.uk>,
	Jayachandran C <jnair@caviumnetworks.com>,
	Hanjun Guo <guohanjun@huawei.com>,
	Robin Murphy <robin.murphy@arm.com>,
	kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v3 12/18] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Date: Mon, 5 Feb 2018 09:08:31 +0000	[thread overview]
Message-ID: <1d30fe51-22dd-6938-2f8f-c823858a3bbd@arm.com> (raw)
In-Reply-To: <20180204183907.GP21802@cbox>

On 04/02/18 18:39, Christoffer Dall wrote:
> On Thu, Feb 01, 2018 at 11:46:51AM +0000, Marc Zyngier wrote:
>> We want SMCCC_ARCH_WORKAROUND_1 to be fast. As fast as possible.
>> So let's intercept it as early as we can by testing for the
>> function call number as soon as we've identified a HVC call
>> coming from the guest.
> 
> Hmmm.  How often is this expected to happen and what is the expected
> extra cost of doing the early-exit handling in the C code vs. here?

Pretty often. On each context switch of a Linux guest, for example. It
is almost as bad as if we were trapping all VM ops. Moving it to C is
definitely visible on something like hackbench (I remember something
like a 10-12% degradation on Seattle, but I'd need to rerun the tests to
give you something accurate). It is the whole GPR save/restore dance
that costs us a lot (31 registers for the guest, 12 for the host), plus
some the extra SError synchronization that doesn't come for free either.

> I think we'd be better off if we only had a single early-exit path (and
> we should move the FP/SIMD trap to that path as well), but if there's a
> measurable benefit of having this logic in assembly as opposed to in the
> C code, then I'm ok with this as well.

I agree that the multiplication of "earlier than early" paths is
becoming annoying. Moving the FP/SIMD stuff to C would be less
problematic, as we have patches to move some of that to load/put, and
we'd only take the trap once per time slice (as opposed to once per
entry at the moment).

Here, we're trying hard to do exactly nothing, because each instruction
is just an extra overhead (we've already nuked the BP). I even
considered inserting that code as part of the per-CPU-type vectors (and
leave the rest of the KVM code alone), but it felt like a step too far.

> The code in this patch looks fine otherwise.

Thanks,

	M.
-- 
Jazz is not dead. It just smells funny...

WARNING: multiple messages have this Message-ID (diff)
From: marc.zyngier@arm.com (Marc Zyngier)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 12/18] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Date: Mon, 5 Feb 2018 09:08:31 +0000	[thread overview]
Message-ID: <1d30fe51-22dd-6938-2f8f-c823858a3bbd@arm.com> (raw)
In-Reply-To: <20180204183907.GP21802@cbox>

On 04/02/18 18:39, Christoffer Dall wrote:
> On Thu, Feb 01, 2018 at 11:46:51AM +0000, Marc Zyngier wrote:
>> We want SMCCC_ARCH_WORKAROUND_1 to be fast. As fast as possible.
>> So let's intercept it as early as we can by testing for the
>> function call number as soon as we've identified a HVC call
>> coming from the guest.
> 
> Hmmm.  How often is this expected to happen and what is the expected
> extra cost of doing the early-exit handling in the C code vs. here?

Pretty often. On each context switch of a Linux guest, for example. It
is almost as bad as if we were trapping all VM ops. Moving it to C is
definitely visible on something like hackbench (I remember something
like a 10-12% degradation on Seattle, but I'd need to rerun the tests to
give you something accurate). It is the whole GPR save/restore dance
that costs us a lot (31 registers for the guest, 12 for the host), plus
some the extra SError synchronization that doesn't come for free either.

> I think we'd be better off if we only had a single early-exit path (and
> we should move the FP/SIMD trap to that path as well), but if there's a
> measurable benefit of having this logic in assembly as opposed to in the
> C code, then I'm ok with this as well.

I agree that the multiplication of "earlier than early" paths is
becoming annoying. Moving the FP/SIMD stuff to C would be less
problematic, as we have patches to move some of that to load/put, and
we'd only take the trap once per time slice (as opposed to once per
entry at the moment).

Here, we're trying hard to do exactly nothing, because each instruction
is just an extra overhead (we've already nuked the BP). I even
considered inserting that code as part of the per-CPU-type vectors (and
leave the rest of the KVM code alone), but it felt like a step too far.

> The code in this patch looks fine otherwise.

Thanks,

	M.
-- 
Jazz is not dead. It just smells funny...

  reply	other threads:[~2018-02-05  9:08 UTC|newest]

Thread overview: 127+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-02-01 11:46 [PATCH v3 00/18] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation Marc Zyngier
2018-02-01 11:46 ` Marc Zyngier
2018-02-01 11:46 ` [PATCH v3 01/18] arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46 ` [PATCH v3 02/18] arm: " Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46 ` [PATCH v3 03/18] arm64: KVM: Increment PC after handling an SMC trap Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 12:33   ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 04/18] arm/arm64: KVM: Consolidate the PSCI include files Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 12:33   ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 05/18] arm/arm64: KVM: Add PSCI_VERSION helper Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 12:33   ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 06/18] arm/arm64: KVM: Add smccc accessors to PSCI code Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 12:33   ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 07/18] arm/arm64: KVM: Implement PSCI 1.0 support Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 12:33   ` Christoffer Dall
2018-02-02 12:33     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 08/18] arm/arm64: KVM: Add PSCI version selection API Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02 20:17   ` Andrew Jones
2018-02-02 20:17     ` Andrew Jones
2018-02-02 20:17     ` Andrew Jones
2018-02-03 11:59     ` Marc Zyngier
2018-02-03 11:59       ` Marc Zyngier
2018-02-03 11:59       ` Marc Zyngier
2018-02-04 12:37       ` Christoffer Dall
2018-02-04 12:37         ` Christoffer Dall
2018-02-05  9:24         ` Marc Zyngier
2018-02-05  9:24           ` Marc Zyngier
2018-02-05  9:24           ` Marc Zyngier
2018-02-05  9:58           ` Andrew Jones
2018-02-05  9:58             ` Andrew Jones
2018-02-05  9:58             ` Andrew Jones
2018-02-05 10:42             ` Marc Zyngier
2018-02-05 10:42               ` Marc Zyngier
2018-02-05 10:50               ` Christoffer Dall
2018-02-05 10:50                 ` Christoffer Dall
2018-02-05 11:08                 ` Marc Zyngier
2018-02-05 11:08                   ` Marc Zyngier
2018-02-05  9:47         ` Andrew Jones
2018-02-05  9:47           ` Andrew Jones
2018-02-05  9:47           ` Andrew Jones
2018-02-05  9:25       ` Andrew Jones
2018-02-05  9:25         ` Andrew Jones
2018-02-04 12:38   ` Christoffer Dall
2018-02-04 12:38     ` Christoffer Dall
2018-02-05  9:30     ` Marc Zyngier
2018-02-05  9:30       ` Marc Zyngier
2018-02-01 11:46 ` [PATCH v3 09/18] arm/arm64: KVM: Advertise SMCCC v1.1 Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-04 18:38   ` Christoffer Dall
2018-02-04 18:38     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 10/18] arm/arm64: KVM: Turn kvm_psci_version into a static inline Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-04 18:38   ` Christoffer Dall
2018-02-04 18:38     ` Christoffer Dall
2018-02-04 18:38     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 11/18] arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-04 18:39   ` Christoffer Dall
2018-02-04 18:39     ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 12/18] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-04 18:39   ` Christoffer Dall
2018-02-04 18:39     ` Christoffer Dall
2018-02-05  9:08     ` Marc Zyngier [this message]
2018-02-05  9:08       ` Marc Zyngier
2018-02-05  9:08       ` Marc Zyngier
2018-02-05 10:18       ` Christoffer Dall
2018-02-05 10:18         ` Christoffer Dall
2018-02-05 10:18         ` Christoffer Dall
2018-02-01 11:46 ` [PATCH v3 13/18] firmware/psci: Expose PSCI conduit Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 12:25   ` Robin Murphy
2018-02-01 12:25     ` Robin Murphy
2018-02-01 11:46 ` [PATCH v3 14/18] firmware/psci: Expose SMCCC version through psci_ops Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 12:32   ` Robin Murphy
2018-02-01 12:32     ` Robin Murphy
2018-02-01 12:48     ` Marc Zyngier
2018-02-01 12:48       ` Marc Zyngier
2018-02-01 12:48       ` Marc Zyngier
2018-02-01 21:17   ` Ard Biesheuvel
2018-02-01 21:17     ` Ard Biesheuvel
2018-02-01 11:46 ` [PATCH v3 15/18] arm/arm64: smccc: Make function identifiers an unsigned quantity Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 12:40   ` Robin Murphy
2018-02-01 12:40     ` Robin Murphy
2018-02-01 12:40     ` Robin Murphy
2018-02-01 12:44     ` Ard Biesheuvel
2018-02-01 12:44       ` Ard Biesheuvel
2018-02-01 11:46 ` [PATCH v3 16/18] arm/arm64: smccc: Implement SMCCC v1.1 inline primitive Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 13:34   ` Robin Murphy
2018-02-01 13:34     ` Robin Murphy
2018-02-01 13:54     ` Marc Zyngier
2018-02-01 13:54       ` Marc Zyngier
2018-02-01 14:18       ` Robin Murphy
2018-02-01 14:18         ` Robin Murphy
2018-02-01 11:46 ` [PATCH v3 17/18] arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-01 11:46 ` [PATCH v3 18/18] arm64: Kill PSCI_GET_VERSION as a variant-2 workaround Marc Zyngier
2018-02-01 11:46   ` Marc Zyngier
2018-02-02  4:05   ` Hanjun Guo
2018-02-02  4:05     ` Hanjun Guo
2018-02-02  4:05     ` Hanjun Guo
2018-02-02 13:17     ` Marc Zyngier
2018-02-02 13:17       ` Marc Zyngier
2018-02-02 13:17       ` Marc Zyngier
2018-02-01 13:59 ` [PATCH v3 00/18] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation Ard Biesheuvel
2018-02-01 13:59   ` Ard Biesheuvel
2018-02-01 14:20   ` Marc Zyngier
2018-02-01 14:20     ` Marc Zyngier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1d30fe51-22dd-6938-2f8f-c823858a3bbd@arm.com \
    --to=marc.zyngier@arm.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=catalin.marinas@arm.com \
    --cc=christoffer.dall@linaro.org \
    --cc=drjones@redhat.com \
    --cc=guohanjun@huawei.com \
    --cc=jcm@redhat.com \
    --cc=jnair@caviumnetworks.com \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@armlinux.org.uk \
    --cc=lorenzo.pieralisi@arm.com \
    --cc=mark.rutland@arm.com \
    --cc=peter.maydell@linaro.org \
    --cc=robin.murphy@arm.com \
    --cc=will.deacon@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.