From: Will Deacon <will.deacon@arm.com>
To: Peter Zijlstra <peterz@infradead.org>
Cc: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com>,
"linux-arch@vger.kernel.org" <linux-arch@vger.kernel.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] barriers: introduce smp_mb__release_acquire and update documentation
Date: Wed, 16 Sep 2015 11:29:08 +0100 [thread overview]
Message-ID: <20150916102908.GA28771@arm.com> (raw)
In-Reply-To: <20150916091452.GC3816@twins.programming.kicks-ass.net>
Hi Paul, Peter,
Thanks for the comments. More below...
On Wed, Sep 16, 2015 at 10:14:52AM +0100, Peter Zijlstra wrote:
> On Tue, Sep 15, 2015 at 10:47:24AM -0700, Paul E. McKenney wrote:
> > > diff --git a/arch/powerpc/include/asm/barrier.h b/arch/powerpc/include/asm/barrier.h
> > > index 0eca6efc0631..919624634d0a 100644
> > > --- a/arch/powerpc/include/asm/barrier.h
> > > +++ b/arch/powerpc/include/asm/barrier.h
> > > @@ -87,6 +87,7 @@ do { \
> > > ___p1; \
> > > })
> > >
> > > +#define smp_mb__release_acquire() smp_mb()
> >
> > If we are handling locking the same as atomic acquire and release
> > operations, this could also be placed between the unlock and the lock.
>
> I think the point was exactly that we need to separate LOCK/UNLOCK from
> ACQUIRE/RELEASE.
Yes, pending the PPC investigation, I'd like to keep this separate for
now.
> > However, independently of the unlock/lock case, this definition and
> > use of smp_mb__release_acquire() does not handle full ordering of a
> > release by one CPU and an acquire of that same variable by another.
>
> > In that case, we need roughly the same setup as the much-maligned
> > smp_mb__after_unlock_lock(). So, do we care about this case? (RCU does,
> > though not 100% sure about any other subsystems.)
>
> Indeed, that is a hole in the definition, that I think we should close.
I'm struggling to understand the hole, but here's my intuition. If an
ACQUIRE on CPUx reads from a RELEASE by CPUy, then I'd expect CPUx to
observe all memory accessed performed by CPUy prior to the RELEASE
before it observes the RELEASE itself, regardless of this new barrier.
I think this matches what we currently have in memory-barriers.txt (i.e.
acquire/release are neither transitive or multi-copy atomic).
Do we have use-cases that need these extra guarantees (outside of the
single RCU case, which is using smp_mb__after_unlock_lock)? I'd rather
not augment smp_mb__release_acquire unless we really have to, so I'd
prefer to document that it only applies when the RELEASE and ACQUIRE are
performed by the same CPU. Thoughts?
> > > #define smp_mb__before_atomic() smp_mb()
> > > #define smp_mb__after_atomic() smp_mb()
> > > #define smp_mb__before_spinlock() smp_mb()
> > > diff --git a/arch/x86/include/asm/barrier.h b/arch/x86/include/asm/barrier.h
> > > index 0681d2532527..1c61ad251e0e 100644
> > > --- a/arch/x86/include/asm/barrier.h
> > > +++ b/arch/x86/include/asm/barrier.h
> > > @@ -85,6 +85,8 @@ do { \
> > > ___p1; \
> > > })
> > >
> > > +#define smp_mb__release_acquire() smp_mb()
> > > +
> > > #endif
> > >
>
> All TSO archs would want this.
If we look at all architectures that implement smp_store_release without
an smp_mb already, we get:
ia64
powerpc
s390
sparc
x86
so it should be enough to provide those with definitions. I'll do that
once we've settled on the documentation bits.
> > > /* Atomic operations are already serializing on x86 */
> > > diff --git a/include/asm-generic/barrier.h b/include/asm-generic/barrier.h
> > > index b42afada1280..61ae95199397 100644
> > > --- a/include/asm-generic/barrier.h
> > > +++ b/include/asm-generic/barrier.h
> > > @@ -119,5 +119,9 @@ do { \
> > > ___p1; \
> > > })
> > >
> > > +#ifndef smp_mb__release_acquire
> > > +#define smp_mb__release_acquire() do { } while (0)
> >
> > Doesn't this need to be barrier() in the case where one variable was
> > released and another was acquired?
>
> Yes, I think its very prudent to never let any barrier degrade to less
> than barrier().
Hey, I just copied read_barrier_depends from the same file! Both
smp_load_acquire and smp_store_release should already provide at least
barrier(), so the above should be sufficient.
Will
next prev parent reply other threads:[~2015-09-16 10:29 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-09-15 16:13 [PATCH] barriers: introduce smp_mb__release_acquire and update documentation Will Deacon
2015-09-15 17:47 ` Paul E. McKenney
2015-09-16 9:14 ` Peter Zijlstra
2015-09-16 10:29 ` Will Deacon [this message]
2015-09-16 10:43 ` Peter Zijlstra
2015-09-16 11:07 ` Will Deacon
2015-09-17 2:50 ` Boqun Feng
2015-09-17 7:57 ` Boqun Feng
2015-09-17 18:00 ` Will Deacon
2015-09-21 13:45 ` Boqun Feng
2015-09-21 14:10 ` Boqun Feng
2015-09-21 22:23 ` Will Deacon
2015-09-21 23:42 ` Boqun Feng
2015-09-22 15:22 ` Paul E. McKenney
2015-09-22 15:58 ` Will Deacon
2015-09-22 16:38 ` Paul E. McKenney
2015-09-16 11:49 ` Boqun Feng
2015-09-16 16:38 ` Will Deacon
2015-09-17 1:56 ` Boqun Feng
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150916102908.GA28771@arm.com \
--to=will.deacon@arm.com \
--cc=linux-arch@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=paulmck@linux.vnet.ibm.com \
--cc=peterz@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.