From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gate.crashing.org (gate.crashing.org [63.228.1.57]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 406kcM3JBlzF21d for ; Fri, 23 Mar 2018 11:16:50 +1100 (AEDT) Message-ID: <1521764168.16434.324.camel@kernel.crashing.org> Subject: Re: RFC on writel and writel_relaxed From: Benjamin Herrenschmidt To: Sinan Kaya , Oliver Cc: linuxppc dev list , "linux-rdma@vger.kernel.org" , Marc Zyngier , Will Deacon Date: Fri, 23 Mar 2018 11:16:08 +1100 In-Reply-To: <5ccdb208-4664-0a7f-df5d-2e12cbe4c239@codeaurora.org> References: <3611eabe-2999-1482-b2b4-6d216bbe4762@codeaurora.org> <4e5c745a-8b9b-959e-8893-d99cd6032484@codeaurora.org> <1521692689.16434.293.camel@kernel.crashing.org> <1521726722.16434.312.camel@kernel.crashing.org> <5ccdb208-4664-0a7f-df5d-2e12cbe4c239@codeaurora.org> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Thu, 2018-03-22 at 12:51 -0500, Sinan Kaya wrote: > On 3/22/2018 8:52 AM, Benjamin Herrenschmidt wrote: > > > > No, it's not sufficient. > > > > Just to clarify ... barrier() is just a compiler barrier, it means the > > compiler will generate things in the order they are written. This isn't > > sufficient on archs with an OO memory model, where an actual memory > > barrier instruction needs to be emited. > > Surprisingly, ARM64 GCC compiler generates a write barrier as > opposed to preventing code reordering. > > I was curious if this is an ARM only thing or not. Are you sure of that ? I thought it's the ARM implementation of writel that had an explicit write barrier in it: #define writel(v,c) ({ __iowmb(); writel_relaxed((v),(c)); }) And __iowmb() is #define __iowmb() wmb() Note, I'm a bit dubious about this in ARM: #define readl(c) ({ u32 __v = readl_relaxed(c); __iormb(); __v; } Will, Marc, on powerpc, we put a sync *before* the read in readl etc... The reasoning was there could be some DMA setup followed by a side effect readl rather than a side effect writel to trigger a DMA. Granted I wouldn't expect modern devices to be that stupid, but I have vague memory of some devices back in the day having that sort of read ops. In general, I though the model offerred by x86 and thus by Linux readl/writel was full synchronization both before and after the MMIO, vs either other MMIO or all other forms of ops (cachable memory, locks etc...). Also, can't the above readl_relaxed leak out of a lock ? Cheers, Ben.