From: "Alex Bennée" <alex.bennee@linaro.org>
To: Richard Henderson <richard.henderson@linaro.org>
Cc: qemu-devel@nongnu.org, f4bug@amsat.org, mads@ynddal.dk,
Paolo Bonzini <pbonzini@redhat.com>
Subject: Re: [PATCH v1 1/9] hw: encode accessing CPU index in MemTxAttrs
Date: Sun, 25 Sep 2022 14:02:23 +0100 [thread overview]
Message-ID: <87h70vha2d.fsf@linaro.org> (raw)
In-Reply-To: <15a379bf-39f2-5fc5-7a6f-3bdd39e5a2c3@linaro.org>
Richard Henderson <richard.henderson@linaro.org> writes:
> On 9/22/22 14:58, Alex Bennée wrote:
>> We currently have hacks across the hw/ to reference current_cpu to
>> work out what the current accessing CPU is. This breaks in some cases
>> including using gdbstub to access HW state. As we have MemTxAttrs to
>> describe details about the access lets extend it to mention if this is
>> a CPU access and which one it is.
>> There are a number of places we need to fix up including:
>> CPU helpers directly calling address_space_*() fns
>> models in hw/ fishing the data out of current_cpu
>> I'll start addressing some of these in following patches.
>> Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
>> ---
>> v2
>> - use separate field cpu_index
>> - bool for requester_is_cpu
>> ---
>> include/exec/memattrs.h | 4 ++++
>> accel/tcg/cputlb.c | 22 ++++++++++++++++------
>> hw/core/cpu-sysemu.c | 17 +++++++++++++----
>> 3 files changed, 33 insertions(+), 10 deletions(-)
>> diff --git a/include/exec/memattrs.h b/include/exec/memattrs.h
>> index 9fb98bc1ef..e83a993c21 100644
>> --- a/include/exec/memattrs.h
>> +++ b/include/exec/memattrs.h
>> @@ -43,6 +43,10 @@ typedef struct MemTxAttrs {
>> * (see MEMTX_ACCESS_ERROR).
>> */
>> unsigned int memory:1;
>> + /* Requester is CPU (or as CPU, e.g. debug) */
>> + bool requester_is_cpu:1;
>> + /* cpu_index (if requester_is_cpu) */
>> + unsigned int cpu_index:16;
>> /* Requester ID (for MSI for example) */
>> unsigned int requester_id:16;
>
> I'm not keen on adding another field like this.
Hmm I thought it was unavoidable from Edgar's comment:
"CPU's can also have a Master-IDs (Requester IDs) which are unrelated to
the Clusters CPU index. This is used for example in the Xilinx ZynqMP
and Xilinx Versal and the XMPU (Memory Protection Units).
Anyway, I think this approach is an improvement from the current state
but would rather see a new separate field from requester_id. Overloading
requester_id will break some of our use-cases (in the Xilinx tree)..."
Of course we don't have to care about external use cases but it seemed
to indicate we might need both.
> I don't think it addresses Peter's point about unique identifiers on
> e.g. the MSI bus. But addressing that is surely an problem for any
> host/pci bridge that supports PCI. Because we're already talking about
> two different busses -- PCI, and the one between the cpu and the
> bridge.
We can return to overloading requester_id with a enum to indicate the
type of bus.
> What bounds our max number of cpus at the moment? We use "int" in
> struct CPUCore, but that's almost certainly for convenience.
>
> target/s390x/cpu.h:#define S390_MAX_CPUS 248
> hw/i386/pc_piix.c: m->max_cpus = HVM_MAX_VCPUS;
>
> hw/i386/pc_q35.c: m->max_cpus = 288;
>
> hw/arm/virt.c: mc->max_cpus = 512;
>
> hw/arm/sbsa-ref.c: mc->max_cpus = 512;
>
> hw/i386/microvm.c: mc->max_cpus = 288;
>
> hw/ppc/spapr.c: mc->max_cpus = INT32_MAX;
>
>
> Most of these are nicely bounded, but HVM_MAX_VCPUS is a magic number
> from Xen, and ppc appears to be prepared for 31 bits worth of cpus.
From 5642e4513e (spapr.c: do not use MachineClass::max_cpus to limit
CPUs) I think it is being a little optimistic. Even with the beefiest
hosts you start to see diminishing returns by ~12 vCPUs and it won't
take long before each extra vCPU just slows you down.
>
>
>> @@ -1340,8 +1340,13 @@ static uint64_t io_readx(CPUArchState *env, CPUIOTLBEntry *iotlbentry,
>> uint64_t val;
>> bool locked = false;
>> MemTxResult r;
>> + MemTxAttrs attrs = iotlbentry->attrs;
>> - section = iotlb_to_section(cpu, iotlbentry->addr,
>> iotlbentry->attrs);
>> + /* encode the accessing CPU */
>> + attrs.requester_is_cpu = 1;
>> + attrs.cpu_index = cpu->cpu_index;
>
>
> As I said before, we cannot set these generically, or
> MEMTXATTRS_UNSPECIFIED means nothing. Furthermore, they should be set
> at the point we create the tlb entry, not while we're reading it.
> Thus this must be done by each target's tlb_fill function.
I was confused by the last comment because I forgot the TLBs are not
shared between cores. So I can just bang:
MemTxAttrs attrs = { .cpu_index = cs->cpu_index };
into arm_cpu_tlb_fill and be done with it? Or only when we know it is an
IOTLB being filled?
>
>> @@ -51,13 +51,22 @@ hwaddr cpu_get_phys_page_attrs_debug(CPUState *cpu, vaddr addr,
>> MemTxAttrs *attrs)
>> {
>> CPUClass *cc = CPU_GET_CLASS(cpu);
>> + MemTxAttrs local = { };
>> + hwaddr res;
>> if (cc->sysemu_ops->get_phys_page_attrs_debug) {
>> - return cc->sysemu_ops->get_phys_page_attrs_debug(cpu, addr, attrs);
>> + res = cc->sysemu_ops->get_phys_page_attrs_debug(cpu, addr, &local);
>> + } else {
>> + /* Fallback for CPUs which don't implement the _attrs_ hook */
>> + local = MEMTXATTRS_UNSPECIFIED;
>> + res = cc->sysemu_ops->get_phys_page_debug(cpu, addr);
>> }
>> - /* Fallback for CPUs which don't implement the _attrs_ hook */
>> - *attrs = MEMTXATTRS_UNSPECIFIED;
>> - return cc->sysemu_ops->get_phys_page_debug(cpu, addr);
>> +
>> + /* debug access is treated as though it came from the CPU */
>> + local.requester_is_cpu = 1;
>> + local.cpu_index = cpu->cpu_index;
>> + *attrs = local;
>> + return res;
>
> Again, I don't think it makes any sense to have .unspecified set, and anything else non-zero.
>
>
> r~
--
Alex Bennée
next prev parent reply other threads:[~2022-09-25 13:14 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-22 14:58 [PATCH v1 0/9] MemTxAttrs cpu_index and gdbstub/next Alex Bennée
2022-09-22 14:58 ` [PATCH v1 1/9] hw: encode accessing CPU index in MemTxAttrs Alex Bennée
2022-09-25 10:08 ` Richard Henderson
2022-09-25 13:02 ` Alex Bennée [this message]
2022-09-26 7:33 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 2/9] qtest: make read/write operation appear to be from CPU Alex Bennée
2022-09-22 14:58 ` [PATCH v1 3/9] hw/intc/gic: use MxTxAttrs to divine accessing CPU Alex Bennée
2022-09-25 10:11 ` Richard Henderson
2022-09-26 10:56 ` mads
2022-09-26 11:01 ` Alex Bennée
2022-09-26 11:20 ` mads
2022-09-22 14:58 ` [PATCH v1 4/9] hw/timer: convert mptimer access to attrs to derive cpu index Alex Bennée
2022-09-25 10:11 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 5/9] configure: move detected gdb to TCG's config-host.mak Alex Bennée
2022-09-25 10:11 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 6/9] gdbstub: move into its own sub directory Alex Bennée
2022-09-25 10:13 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 7/9] gdbstub: move sstep flags probing into AccelClass Alex Bennée
2022-09-22 21:49 ` Philippe Mathieu-Daudé via
2022-09-25 10:14 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 8/9] gdbstub: move breakpoint logic to accel ops Alex Bennée
2022-09-25 10:18 ` Richard Henderson
2022-09-22 14:58 ` [PATCH v1 9/9] gdbstub: move guest debug support check to ops Alex Bennée
2022-09-22 21:51 ` Philippe Mathieu-Daudé via
2022-09-25 10:18 ` Richard Henderson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87h70vha2d.fsf@linaro.org \
--to=alex.bennee@linaro.org \
--cc=f4bug@amsat.org \
--cc=mads@ynddal.dk \
--cc=pbonzini@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=richard.henderson@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).