[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201216003802.5fpklvx37yuiufrt@treble>
Date: Tue, 15 Dec 2020 18:38:02 -0600
From: Josh Poimboeuf <jpoimboe@...hat.com>
To: Peter Zijlstra <peterz@...radead.org>
Cc: Jürgen Groß <jgross@...e.com>,
xen-devel@...ts.xenproject.org, x86@...nel.org,
linux-kernel@...r.kernel.org,
virtualization@...ts.linux-foundation.org,
linux-hyperv@...r.kernel.org, kvm@...r.kernel.org, luto@...nel.org,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
"H. Peter Anvin" <hpa@...or.com>,
Boris Ostrovsky <boris.ostrovsky@...cle.com>,
Stefano Stabellini <sstabellini@...nel.org>,
Deep Shah <sdeep@...are.com>,
"VMware, Inc." <pv-drivers@...are.com>,
"K. Y. Srinivasan" <kys@...rosoft.com>,
Haiyang Zhang <haiyangz@...rosoft.com>,
Stephen Hemminger <sthemmin@...rosoft.com>,
Wei Liu <wei.liu@...nel.org>,
Paolo Bonzini <pbonzini@...hat.com>,
Sean Christopherson <sean.j.christopherson@...el.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>,
Wanpeng Li <wanpengli@...cent.com>,
Jim Mattson <jmattson@...gle.com>,
Joerg Roedel <joro@...tes.org>,
Daniel Lezcano <daniel.lezcano@...aro.org>,
Juri Lelli <juri.lelli@...hat.com>,
Vincent Guittot <vincent.guittot@...aro.org>,
Dietmar Eggemann <dietmar.eggemann@....com>,
Steven Rostedt <rostedt@...dmis.org>,
Ben Segall <bsegall@...gle.com>, Mel Gorman <mgorman@...e.de>,
Daniel Bristot de Oliveira <bristot@...hat.com>
Subject: Re: [PATCH v2 00/12] x86: major paravirt cleanup
On Tue, Dec 15, 2020 at 03:54:08PM +0100, Peter Zijlstra wrote:
> The problem is that a single instance of unwind information (ORC) must
> capture and correctly unwind all alternatives. Since the trivially
> correct mandate is out, implement the straight forward brute-force
> approach:
>
> 1) generate CFI information for each alternative
>
> 2) unwind every alternative with the merge-sort of the previously
> generated CFI information -- O(n^2)
>
> 3) for any possible conflict: yell.
>
> 4) Generate ORC with merge-sort
>
> Specifically for 3 there are two possible classes of conflicts:
>
> - the merge-sort itself could find conflicting CFI for the same
> offset.
>
> - the unwind can fail with the merged CFI.
So much algorithm. Could we make it easier by caching the shared
per-alt-group CFI state somewhere along the way?
For example:
struct alt_group_info {
/* first original insn in the group */
struct instruction *orig_insn;
/* max # of bytes in the group (cfi array size) */
unsigned long nbytes;
/* byte-offset-addressed array of CFI pointers */
struct cfi_state **cfi;
};
We could change 'insn->alt_group' to be a pointer to a shared instance
of the above struct, so that all original and replacement instructions
in a group have a pointer to it.
Starting out, 'cfi' array is all NULLs. Then when updating CFI, check
'insn->alt_group.cfi[offset]'.
[ 'offset' is a byte offset from the beginning of the group. It could
be calculated based on 'orig_insn' or 'orig_insn->alts', depending on
whether 'insn' is an original or a replacement. ]
If the array entry is NULL, just update it with a pointer to the CFI.
If it's not NULL, make sure it matches the existing CFI, and WARN if it
doesn't.
Also, with this data structure, the ORC generation should also be a lot
more straightforward, just ignore the NULL entries.
Thoughts? This is all theoretical of course, I could try to do a patch
tomorrow.
--
Josh
Powered by blists - more mailing lists