Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754221Ab2HDXMJ (ORCPT ); Sat, 4 Aug 2012 19:12:09 -0400 Received: from e35.co.us.ibm.com ([32.97.110.153]:58940 "EHLO e35.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754159Ab2HDXMF (ORCPT ); Sat, 4 Aug 2012 19:12:05 -0400 Date: Sat, 4 Aug 2012 16:11:51 -0700 From: "Paul E. McKenney" To: "Dr. David Alan Gilbert" Cc: Andrea Arcangeli , Hugh Dickins , Peter Zijlstra , Linus Torvalds , Rik van Riel , Andrew Morton , Nick Piggin , linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org Subject: Re: [RFC] page-table walkers vs memory order Message-ID: <20120804231151.GK3307@linux.vnet.ibm.com> Reply-To: paulmck@linux.vnet.ibm.com References: <1343064870.26034.23.camel@twins> <20120804143719.GB10459@redhat.com> <20120804220245.GB3307@linux.vnet.ibm.com> <20120804224705.GD10459@redhat.com> <20120804225910.GB1255@gallifrey> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20120804225910.GB1255@gallifrey> User-Agent: Mutt/1.5.21 (2010-09-15) X-Content-Scanned: Fidelis XPS MAILER x-cbid: 12080423-6148-0000-0000-000008524937 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3454 Lines: 66 On Sat, Aug 04, 2012 at 11:59:10PM +0100, Dr. David Alan Gilbert wrote: > * Andrea Arcangeli (aarcange@redhat.com) wrote: > > On Sat, Aug 04, 2012 at 03:02:45PM -0700, Paul E. McKenney wrote: > > > OK, I'll bite. ;-) > > > > :)) > > > > > The most sane way for this to happen is with feedback-driven techniques > > > involving profiling, similar to what is done for basic-block reordering > > > or branch prediction. The idea is that you compile the kernel in an > > > as-yet (and thankfully) mythical pointer-profiling mode, which records > > > the values of pointer loads and also measures the pointer-load latency. > > > If a situation is found where a given pointer almost always has the > > > same value but has high load latency (for example, is almost always a > > > high-latency cache miss), this fact is recorded and fed back into a > > > subsequent kernel build. This subsequent kernel build might choose to > > > speculate the value of the pointer concurrently with the pointer load. > > > > > > And of course, when interpreting the phrase "most sane way" at the > > > beginning of the prior paragraph, it would probably be wise to keep > > > in mind who wrote it. And that "most sane way" might have little or > > > no resemblance to anything that typical kernel hackers would consider > > > anywhere near sanity. ;-) > > > > I see. The above scenario is sure fair enough assumption. We're > > clearly stretching the constraints to see what is theoretically > > possible and this is a very clear explanation of how gcc could have an > > hardcoded "guessed" address in the .text. > > > > Next step to clearify now, is how gcc can safely dereference such a > > "guessed" address without the kernel knowing about it. > > > > If gcc would really dereference a guessed address coming from a > > profiling run without kernel being aware of it, it would eventually > > crash the kernel with an oops. gcc cannot know what another CPU will > > do with the kernel pagetables. It'd be perfectly legitimate to > > temporarily move the data at the "guessed address" to another page and > > to update the pointer through stop_cpu during some weird "cpu > > offlining scenario" or anything you can imagine. I mean gcc must > > behave in all cases so it's not allowed to deference the guessed > > address at any given time. > > A compiler could decide to dereference it using a non-faulting load, > do the calculations or whatever on the returned value of the non-faulting > load, and then check whether the load actually faulted, and whether the > address matched the prediction before it did a store based on it's > guess. Or the compiler could record a recovery address in a per-thread variable before doing the speculative reference. The page-fault handler could consult the per-thread variable and take appropriate action. But both this approach and your approach are vulnerable to things like having the speculation area mapped to (say) MMIO space. Not good! So I am with Andrea on this one -- there would need to be some handshake between kernel and compiler to avoid messing with possibly-unsafe mappings. And I am still not much in favor of value speculation. ;-) Thanx, Paul -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/