From: Claudio Fontana <cfontana@suse.de>
To: "Alex Bennée" <alex.bennee@linaro.org>
Cc: "Alessandro Di Federico" <ale@rev.ng>,
"Philippe Mathieu-Daudé" <philmd@linaro.org>,
qemu-devel@nongnu.org,
"Richard Henderson" <richard.henderson@linaro.org>,
"Paolo Bonzini" <pbonzini@redhat.com>,
"Eduardo Habkost" <eduardo@habkost.net>,
"Fabiano Rosas" <fabiano.rosas@suse.com>
Subject: Re: [PATCH 02/10] accel/tcg: move cpu_reloading_memory_map into cpu-exec-softmmu
Date: Mon, 20 Mar 2023 15:01:06 +0100 [thread overview]
Message-ID: <34fc1e42-a0f7-c0fe-300f-3ad78deb8e6c@suse.de> (raw)
In-Reply-To: <87355z8ry2.fsf@linaro.org>
On 3/20/23 14:32, Alex Bennée wrote:
>
> Claudio Fontana <cfontana@suse.de> writes:
>
>> How is this conditional on CONFIG_TCG? To me it looks like this breaks !CONFIG_TCG.
>> Careful, the meson.build in accel/tcg/meson.build is always recursed.
>
> Surely it shouldn't be in accel/tcg then?
Hi Alex,
maybe we did not understand each other.
What I mean is that accel/tcg/meson.build is not conditionally read, it is _always_ read.
Therefore TCG-specific code needs to be conditionally included using the CONFIG_TCG.
Ciao,
Claudio
>
>> This code was in tcg_ss before, why not simply add it to tcg_ss and
>> then to specific_ss along with the other tcg pieces?
>
> tcg_ss is rebuilt for every target. So far the code in cpu-exec-softmmu
> should only need to for softmmu targets and hopefully share the same
> binary for all variants.
>
> I guess I'll have to do something more in line with the recent
> re-factoring of gdbstub:
>
> # We build two versions of gdbstub, one for each mode
> gdb_user_ss.add(files('gdbstub.c', 'user.c'))
> gdb_softmmu_ss.add(files('gdbstub.c', 'softmmu.c'))
>
> gdb_user_ss = gdb_user_ss.apply(config_host, strict: false)
> gdb_softmmu_ss = gdb_softmmu_ss.apply(config_host, strict: false)
>
> libgdb_user = static_library('gdb_user',
> gdb_user_ss.sources() + genh,
> name_suffix: 'fa',
> c_args: '-DCONFIG_USER_ONLY')
>
> libgdb_softmmu = static_library('gdb_softmmu',
> gdb_softmmu_ss.sources() + genh,
> name_suffix: 'fa')
>
> gdb_user = declare_dependency(link_whole: libgdb_user)
> user_ss.add(gdb_user)
> gdb_softmmu = declare_dependency(link_whole: libgdb_softmmu)
> softmmu_ss.add(gdb_softmmu)
>
>
>>
>> Ciao,
>>
>> C
>>
>>
>> On 3/20/23 11:10, Alex Bennée wrote:
>>> This doesn't save much as cpu-exec-common still needs to be built
>>> per-target for its knowledge of CPUState but this helps with keeping
>>> things organised.
>>>
>>> Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
>>> ---
>>> accel/tcg/cpu-exec-common.c | 30 ----------------------
>>> accel/tcg/cpu-exec-softmmu.c | 50 ++++++++++++++++++++++++++++++++++++
>>> accel/tcg/meson.build | 10 ++++++++
>>> 3 files changed, 60 insertions(+), 30 deletions(-)
>>> create mode 100644 accel/tcg/cpu-exec-softmmu.c
>>>
>>> diff --git a/accel/tcg/cpu-exec-common.c b/accel/tcg/cpu-exec-common.c
>>> index e7962c9348..c6b0ad303e 100644
>>> --- a/accel/tcg/cpu-exec-common.c
>>> +++ b/accel/tcg/cpu-exec-common.c
>>> @@ -32,36 +32,6 @@ void cpu_loop_exit_noexc(CPUState *cpu)
>>> cpu_loop_exit(cpu);
>>> }
>>>
>>> -#if defined(CONFIG_SOFTMMU)
>>> -void cpu_reloading_memory_map(void)
>>> -{
>>> - if (qemu_in_vcpu_thread() && current_cpu->running) {
>>> - /* The guest can in theory prolong the RCU critical section as long
>>> - * as it feels like. The major problem with this is that because it
>>> - * can do multiple reconfigurations of the memory map within the
>>> - * critical section, we could potentially accumulate an unbounded
>>> - * collection of memory data structures awaiting reclamation.
>>> - *
>>> - * Because the only thing we're currently protecting with RCU is the
>>> - * memory data structures, it's sufficient to break the critical section
>>> - * in this callback, which we know will get called every time the
>>> - * memory map is rearranged.
>>> - *
>>> - * (If we add anything else in the system that uses RCU to protect
>>> - * its data structures, we will need to implement some other mechanism
>>> - * to force TCG CPUs to exit the critical section, at which point this
>>> - * part of this callback might become unnecessary.)
>>> - *
>>> - * This pair matches cpu_exec's rcu_read_lock()/rcu_read_unlock(), which
>>> - * only protects cpu->as->dispatch. Since we know our caller is about
>>> - * to reload it, it's safe to split the critical section.
>>> - */
>>> - rcu_read_unlock();
>>> - rcu_read_lock();
>>> - }
>>> -}
>>> -#endif
>>> -
>>> void cpu_loop_exit(CPUState *cpu)
>>> {
>>> /* Undo the setting in cpu_tb_exec. */
>>> diff --git a/accel/tcg/cpu-exec-softmmu.c b/accel/tcg/cpu-exec-softmmu.c
>>> new file mode 100644
>>> index 0000000000..2318dd8c7d
>>> --- /dev/null
>>> +++ b/accel/tcg/cpu-exec-softmmu.c
>>> @@ -0,0 +1,50 @@
>>> +/*
>>> + * Emulator main CPU execution loop, softmmu bits
>>> + *
>>> + * Copyright (c) 2003-2005 Fabrice Bellard
>>> + *
>>> + * This library is free software; you can redistribute it and/or
>>> + * modify it under the terms of the GNU Lesser General Public
>>> + * License as published by the Free Software Foundation; either
>>> + * version 2.1 of the License, or (at your option) any later version.
>>> + *
>>> + * This library is distributed in the hope that it will be useful,
>>> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
>>> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
>>> + * Lesser General Public License for more details.
>>> + *
>>> + * You should have received a copy of the GNU Lesser General Public
>>> + * License along with this library; if not, see <http://www.gnu.org/licenses/>.
>>> + */
>>> +
>>> +#include "qemu/osdep.h"
>>> +#include "hw/core/cpu.h"
>>> +#include "sysemu/cpus.h"
>>> +
>>> +void cpu_reloading_memory_map(void)
>>> +{
>>> + if (qemu_in_vcpu_thread() && current_cpu->running) {
>>> + /* The guest can in theory prolong the RCU critical section as long
>>> + * as it feels like. The major problem with this is that because it
>>> + * can do multiple reconfigurations of the memory map within the
>>> + * critical section, we could potentially accumulate an unbounded
>>> + * collection of memory data structures awaiting reclamation.
>>> + *
>>> + * Because the only thing we're currently protecting with RCU is the
>>> + * memory data structures, it's sufficient to break the critical section
>>> + * in this callback, which we know will get called every time the
>>> + * memory map is rearranged.
>>> + *
>>> + * (If we add anything else in the system that uses RCU to protect
>>> + * its data structures, we will need to implement some other mechanism
>>> + * to force TCG CPUs to exit the critical section, at which point this
>>> + * part of this callback might become unnecessary.)
>>> + *
>>> + * This pair matches cpu_exec's rcu_read_lock()/rcu_read_unlock(), which
>>> + * only protects cpu->as->dispatch. Since we know our caller is about
>>> + * to reload it, it's safe to split the critical section.
>>> + */
>>> + rcu_read_unlock();
>>> + rcu_read_lock();
>>> + }
>>> +}
>>> diff --git a/accel/tcg/meson.build b/accel/tcg/meson.build
>>> index aeb20a6ef0..bdc086b90d 100644
>>> --- a/accel/tcg/meson.build
>>> +++ b/accel/tcg/meson.build
>>> @@ -1,3 +1,9 @@
>>> +#
>>> +# Currently most things here end up in specific_ss eventually because
>>> +# they need knowledge of CPUState. Stuff that that doesn't can live in
>>> +# common user, softmmu or overall code
>>> +#
>>> +
>>> tcg_ss = ss.source_set()
>>> tcg_ss.add(files(
>>> 'tcg-all.c',
>>> @@ -9,6 +15,7 @@ tcg_ss.add(files(
>>> 'translate-all.c',
>>> 'translator.c',
>>> ))
>>> +
>>> tcg_ss.add(when: 'CONFIG_USER_ONLY', if_true: files('user-exec.c'))
>>> tcg_ss.add(when: 'CONFIG_SOFTMMU', if_false: files('user-exec-stub.c'))
>>> tcg_ss.add(when: 'CONFIG_PLUGIN', if_true: [files('plugin-gen.c')])
>>> @@ -27,3 +34,6 @@ tcg_module_ss.add(when: ['CONFIG_SOFTMMU', 'CONFIG_TCG'], if_true: files(
>>> 'tcg-accel-ops-icount.c',
>>> 'tcg-accel-ops-rr.c',
>>> ))
>>> +
>>> +# Common softmmu code
>>> +softmmu_ss.add(files('cpu-exec-softmmu.c'))
>
>
next prev parent reply other threads:[~2023-03-20 14:02 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-03-20 10:10 [PATCH 00/10] accel/tcg: refactor the cpu-exec loop Alex Bennée
2023-03-20 10:10 ` [PATCH 01/10] metadata: add .git-blame-ignore-revs Alex Bennée
2023-03-21 14:17 ` Philippe Mathieu-Daudé
2023-03-20 10:10 ` [PATCH 02/10] accel/tcg: move cpu_reloading_memory_map into cpu-exec-softmmu Alex Bennée
2023-03-20 12:56 ` Claudio Fontana
2023-03-20 13:32 ` Alex Bennée
2023-03-20 14:01 ` Claudio Fontana [this message]
2023-03-20 14:33 ` Alex Bennée
2023-03-20 16:14 ` Richard Henderson
2023-03-21 16:07 ` Alessandro Di Federico via
2023-03-20 10:10 ` [PATCH 03/10] accel/tcg: move i386 halt handling to sysemu_ops Alex Bennée
2023-03-20 14:52 ` Philippe Mathieu-Daudé
2023-03-20 17:18 ` Alex Bennée
2023-03-20 15:23 ` Claudio Fontana
2023-03-20 15:34 ` Philippe Mathieu-Daudé
2023-03-21 8:47 ` Claudio Fontana
2023-03-20 17:20 ` Alex Bennée
2023-03-20 10:10 ` [PATCH 04/10] accel/tcg: don't bother with ifdef for CPU_DUMP_CCOP Alex Bennée
2023-03-20 16:16 ` Richard Henderson
2023-03-20 16:17 ` Richard Henderson
2023-03-20 10:10 ` [PATCH 05/10] accel/tcg: remove the fake_user_interrupt guards Alex Bennée
2023-03-20 16:18 ` Richard Henderson
2023-03-20 10:10 ` [PATCH 06/10] includes: move irq definitions out of cpu-all.h Alex Bennée
2023-03-20 16:20 ` Richard Henderson
2023-03-21 16:06 ` Alessandro Di Federico via
2023-03-22 5:25 ` Richard Henderson
2023-03-22 21:15 ` Alessandro Di Federico
2023-03-20 10:10 ` [PATCH 07/10] accel/tcg: use QEMU_IOTHREAD_LOCK_GUARD to cover the exit Alex Bennée
2023-03-20 14:55 ` Philippe Mathieu-Daudé
2023-03-20 16:21 ` Richard Henderson
2023-03-20 10:10 ` [PATCH 08/10] accel/tcg: push i386 specific hacks into handle_cpu_interrupt callback Alex Bennée
2023-03-20 16:27 ` Richard Henderson
2023-03-20 17:14 ` Alex Bennée
2023-03-21 6:04 ` Richard Henderson
2023-03-20 10:10 ` [PATCH 09/10] accel/tcg: re-inline the filtering of virtual IRQs but data driven Alex Bennée
2023-03-20 14:58 ` Philippe Mathieu-Daudé
2023-03-20 16:30 ` Richard Henderson
2023-03-20 10:10 ` [PATCH 10/10] accel/tcg: remove unused includes Alex Bennée
2023-03-20 16:30 ` Richard Henderson
2023-03-21 16:07 ` Alessandro Di Federico via
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=34fc1e42-a0f7-c0fe-300f-3ad78deb8e6c@suse.de \
--to=cfontana@suse.de \
--cc=ale@rev.ng \
--cc=alex.bennee@linaro.org \
--cc=eduardo@habkost.net \
--cc=fabiano.rosas@suse.com \
--cc=pbonzini@redhat.com \
--cc=philmd@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=richard.henderson@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).