From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E1BCC433B4 for ; Tue, 18 May 2021 18:38:10 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id C116D610CD for ; Tue, 18 May 2021 18:38:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org C116D610CD Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:Message-Id:Date: Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=OZKZ5t3VUza4xgqkV5R06lPYCs+sJ6TE0O3/A3YI++8=; b=ayNNJklYA6B/g1nSYLVkz+5bY GxEgo0L+Skp8/naNKXIOaEtoBBhHwm9OgJewxVAz9uHGgsKfBqPf4evLU4UaYYb+sfpdZNU47IiW+ GuH30UajEO93X2CrZu/Z4BxImaJ1KqzBmuI9vL6UsIXqZSXwuIyuFD44uN1iRtsWwz8WDWqZxUFTB mXCjVSNJZce8PgX20PPhMoaBC9txqKix08s7Vlb3PnlfmPHtMwTTHgnmKuHGvPR9KocGAXDlBP8sI Wo+takV2QqAYdlbTNtjVuVP0XpNIMKuokuVcB0HahJ4RLZDHc+7cBaUZIfH+5oq1bU9y6VRFH4WJx pFIQEuMNQ==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lj4Zf-001cZ6-CR; Tue, 18 May 2021 18:36:11 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lj4ZJ-001cWs-Hy for linux-arm-kernel@desiato.infradead.org; Tue, 18 May 2021 18:35:49 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender :Reply-To:Content-Type:Content-ID:Content-Description; bh=HlIfmMPxLVaiVxH87hQnn5DpeifN726bZMw+Rd0lxfQ=; b=kFKsfF9ZXfyw/KGSiHkXRW+TP0 y/YUo+xTxy7a7x5DXQg3Jgh+nbH+0bus6dTERFQnymZFFARdaUzO/0fZtKI34FE/1J9Ja1ywlL3tm eHlC/yU3nUyHDWgewabR12S0BiapYVLjkm0u5ThEu84e2Nhjq8t8zADOGyqTH5fWBearsgDKPX/vI iNPh7ICnniPwj8+3Q4c8RgudpuHsOqUgPjmUA/vjMahd7PRXO975J9/fsZzCOQqx8u5zq9rK5yvpx 1/Ud4yLvaZv+H75RNGDkm6MS2A5PJv8e74AMUuKlSSXRXuFl2dj4G3eFoIuF9IuJ/h35JJWJ+uolz Y7E/xarA==; Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lj4ZG-00Esv7-KG for linux-arm-kernel@lists.infradead.org; Tue, 18 May 2021 18:35:48 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id C6B8461285; Tue, 18 May 2021 18:35:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1621362946; bh=Frbvtwsu9igyVGWwwxpkpcW5ACCXRKZCJfd1G5aKU+8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dw1YNoWpdF95fSdzVuOV8SHn5n6g4SZe/5p4UwGulrOnjBi6zrOmSLAbET844qfEq JewDBP3ZGyjIjNfVeu+zxE0ecPrrFDq5LGOf5PNHwDjAj/k29bbP/ojkQOLPQPoMr6 RuucLNycawdu7xdKuM+1ehZv9M/um4O5OFMTIQbuUBoazSlIamZ8aAB64B6qPE1+Z+ tqdU7jwF7mvsFTSw+dCVAWBjFUxWHM1uAelLCOSPrSOKzrVLjSzJHIdpDIWZVsyQcj ozC+WqOVKBQHL8LkIvicuVUAYM8bDjxYs4gm1Nu7DGijKVkB/XqBVFyYpAjQS6gfRr Nj3GLLR8upwUg== From: Mark Brown To: Catalin Marinas , Will Deacon Cc: Mark Rutland , Lorenzo Pieralisi , Sudeep Holla , Marc Zyngier , Ard Biesheuvel , linux-arm-kernel@lists.infradead.org, Mark Brown Subject: [PATCH v2 2/2] arm64: smccc: Support SMCCC v1.3 SVE register saving hint Date: Tue, 18 May 2021 19:25:49 +0100 Message-Id: <20210518182549.38635-3-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210518182549.38635-1-broonie@kernel.org> References: <20210518182549.38635-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=6223; h=from:subject; bh=Frbvtwsu9igyVGWwwxpkpcW5ACCXRKZCJfd1G5aKU+8=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBgpAasuXLcUCsf01gTCxggZI1Mj3lCecg5XsFQB/JN 0LMTwPqJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYKQGrAAKCRAk1otyXVSH0JbrB/ 4tQLAw8cfqp8jIQ0HH/oc8L1iGFyDIAQ1wARUKsy1u3KvR9HS3th1LzrOqsS7rlipvQ8VosEotNCJv 9rA/MpGxn+wxd2p0pvHoDFDp6F/9F02tAZOA/u8VQKVba0NQY71A78KCu/fxOu0ONHolV8JiP0jLc2 ajRIfr49fGMzMQr1a8HwrXlz3iVPwwdxguu2aPfbSdjq/D55RBRazH5AugAS4PYPhbYJu8+I9gN+uZ PbDNZ/yAYKY78Dk7YyDD33uf6et9jvAAGvlnm/hEkmski+AzpzRY9WyAZAr+JFxVaWa3tf6iH8ZaaD p1Vv8yET0/Z6oU9QoS1KuqHuPqWBxu X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210518_113546_725170_CC05C785 X-CRM114-Status: GOOD ( 22.33 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org SMCCC v1.2 requires that all SVE state be preserved over SMC calls which introduces substantial overhead in the common case where there is no SVE state in the registers. To avoid this SMCCC v1.3 introduces a flag which allows the caller to say that there is no state that needs to be preserved in the registers. Make use of this flag, setting it if the SMCCC version indicates support for it and the TIF_ flags indicate that there is no live SVE state in the registers, this avoids placing any constraints on when SMCCC calls can be done or triggering extra saving and reloading of SVE register state in the kernel. This would be straightforward enough except for the rather entertaining inline assembly we use to do SMCCC v1.1 calls to allow us to take advantage of the limited number of registers it clobbers. Deal with this by having a slightly non-standard function which we call immediately before issuing the SMCCC call to make our checks. This causes an extra function call on any system built with SVE support, and extra checks when SVE is detected at runtime, but these costs are expected to be reasonable in the context of doing a SMCCC call in the first place. Since we can't check the TIF_ flags for current and would need to map the helper function separately when in the nVHE hypervisor we don't attempt to do the optimisation for it, this could be done as a followup. Signed-off-by: Mark Brown --- arch/arm64/kernel/smccc-call.S | 38 ++++++++++++++++++++++++++++++++++ drivers/firmware/smccc/smccc.c | 4 ++++ include/linux/arm-smccc.h | 23 ++++++++++++++++++-- 3 files changed, 63 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kernel/smccc-call.S b/arch/arm64/kernel/smccc-call.S index d62447964ed9..2713ea37b536 100644 --- a/arch/arm64/kernel/smccc-call.S +++ b/arch/arm64/kernel/smccc-call.S @@ -7,8 +7,46 @@ #include #include +#include + +/* + * If we have SMCCC v1.3 and (as is likely) no SVE state in + * the registers then set the SMCCC hint bit to say there's no + * need to preserve it. Do this by directly adjusting the SMCCC + * function value which is already stored in x0 ready to be called. + * + * Since we need scratch registers but wish to avoid having to handle + * the stack we expect the caller to preserve x15 and x16 if needed, + * the only callers are expected to be the call below and the inline + * asm in linux/arm-smccc.h for SMCCC 1.1 and later calls. + */ +SYM_CODE_START(__smccc_sve_check) + BTI_C + +alternative_if ARM64_SVE + + ldr_l x15, smccc_has_sve_hint + cbz x15, 2f + + get_current_task x15 + ldr x15, [x15, #TSK_TI_FLAGS] + and x16, x15, #_TIF_FOREIGN_FPSTATE // Any live FP state? + cbnz x16, 1f + mov x16, #_TIF_SVE // Does that state include SVE? + and x16, x15, x16 + cbnz x16, 2f + +1: orr x0, x0, ARM_SMCCC_1_3_SVE_HINT +alternative_else_nop_endif + +2: ret +SYM_CODE_END(__smccc_sve_check) +EXPORT_SYMBOL(__smccc_sve_check) .macro SMCCC instr +alternative_if ARM64_SVE + bl __smccc_sve_check +alternative_else_nop_endif \instr #0 ldr x4, [sp] stp x0, x1, [x4, #ARM_SMCCC_RES_X0_OFFS] diff --git a/drivers/firmware/smccc/smccc.c b/drivers/firmware/smccc/smccc.c index 028f81d702cc..9f937b125ab0 100644 --- a/drivers/firmware/smccc/smccc.c +++ b/drivers/firmware/smccc/smccc.c @@ -15,6 +15,7 @@ static u32 smccc_version = ARM_SMCCC_VERSION_1_0; static enum arm_smccc_conduit smccc_conduit = SMCCC_CONDUIT_NONE; bool __ro_after_init smccc_trng_available = false; +u64 __ro_after_init smccc_has_sve_hint = false; void __init arm_smccc_version_init(u32 version, enum arm_smccc_conduit conduit) { @@ -22,6 +23,9 @@ void __init arm_smccc_version_init(u32 version, enum arm_smccc_conduit conduit) smccc_conduit = conduit; smccc_trng_available = smccc_probe_trng(); + if (IS_ENABLED(CONFIG_ARM64_SVE) && + smccc_version >= ARM_SMCCC_VERSION_1_3) + smccc_has_sve_hint = true; } enum arm_smccc_conduit arm_smccc_1_1_get_conduit(void) diff --git a/include/linux/arm-smccc.h b/include/linux/arm-smccc.h index 6861489a1890..9e974a9f8993 100644 --- a/include/linux/arm-smccc.h +++ b/include/linux/arm-smccc.h @@ -63,6 +63,9 @@ #define ARM_SMCCC_VERSION_1_0 0x10000 #define ARM_SMCCC_VERSION_1_1 0x10001 #define ARM_SMCCC_VERSION_1_2 0x10002 +#define ARM_SMCCC_VERSION_1_3 0x10003 + +#define ARM_SMCCC_1_3_SVE_HINT 0x10000 #define ARM_SMCCC_VERSION_FUNC_ID \ ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \ @@ -216,6 +219,8 @@ u32 arm_smccc_get_version(void); void __init arm_smccc_version_init(u32 version, enum arm_smccc_conduit conduit); +extern u64 smccc_has_sve_hint; + /** * struct arm_smccc_res - Result from SMC/HVC call * @a0-a3 result values from registers 0 to 3 @@ -297,6 +302,19 @@ asmlinkage void __arm_smccc_hvc(unsigned long a0, unsigned long a1, #endif +/* nVHE hypervisor doesn't have a current thread so needs separate checks */ +#if defined(CONFIG_ARM64_SVE) && !defined(__KVM_NVHE_HYPERVISOR__) + +#define SMCCC_SVE_CHECK "bl __smccc_sve_check \n" +#define smccc_sve_clobbers "x15", "x16", "lr", + +#else + +#define SMCCC_SVE_CHECK +#define smccc_sve_clobbers + +#endif + #define ___count_args(_0, _1, _2, _3, _4, _5, _6, _7, _8, x, ...) x #define __count_args(...) \ @@ -364,7 +382,7 @@ asmlinkage void __arm_smccc_hvc(unsigned long a0, unsigned long a1, #define ___constraints(count) \ : __constraint_read_ ## count \ - : "memory" + : smccc_sve_clobbers "memory" #define __constraints(count) ___constraints(count) /* @@ -379,7 +397,8 @@ asmlinkage void __arm_smccc_hvc(unsigned long a0, unsigned long a1, register unsigned long r2 asm("r2"); \ register unsigned long r3 asm("r3"); \ __declare_args(__count_args(__VA_ARGS__), __VA_ARGS__); \ - asm volatile(inst "\n" : \ + asm volatile(SMCCC_SVE_CHECK \ + inst "\n" : \ "=r" (r0), "=r" (r1), "=r" (r2), "=r" (r3) \ __constraints(__count_args(__VA_ARGS__))); \ if (___res) \ -- 2.20.1 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel