From: Peter Zijlstra <peterz@infradead.org>
To: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Cc: tglx@linutronix.de, Heinz.Egger@linutronix.de,
bigeasy@linutronix.de,
Linux Kernel Mailing List <linux-kernel@vger.kernel.org>,
"Molnar, Ingo" <mingo@kernel.org>, rostedt <rostedt@goodmis.org>,
"Paul E. McKenney" <paulmck@linux.vnet.ibm.com>
Subject: Re: Perf user-space ABI sequence lock memory barriers
Date: Wed, 5 Feb 2014 09:05:18 +0100 [thread overview]
Message-ID: <20140205080518.GF2936@laptop.programming.kicks-ass.net> (raw)
In-Reply-To: <238497929.19329.1391554584871.JavaMail.zimbra@efficios.com>
On Tue, Feb 04, 2014 at 10:56:24PM +0000, Mathieu Desnoyers wrote:
> Hi,
>
> I'm currently integrating user-space performance counters from
> Perf into LTTng-UST, and I'm noticing something odd regarding
> the home-made sequence lock found at:
>
> kernel/events/core.c: perf_event_update_userpage()
>
> ++userpg->lock;
> barrier();
> [...]
> barrier();
> ++userpg->lock;
>
> This goes in pair with something like this at user-level:
>
> do {
> seq = pc->lock;
You could make that:
while ((seq = pc->lock) & 1);
> barrier();
>
> idx = pc->index;
> count = pc->offset;
> if (idx)
> count += rdpmc(idx - 1);
>
> barrier();
> } while (pc->lock != seq);
>
> As we see, only compiler barrier() are protecting all this.
> First question, is it possible that the update be performed
> by a thread running on a different CPU than the thread reading
> the info in user-space ?
You can make that so, but that is not a 'supported' case. This all
assumes you're monitoring yourself, in which case the event is ran on
the cpu you are running on too and the updates are matched on cpu, or
separated by schedule() which includes the required memory barriers to
make it appear its all on the same cpu anyway.
> I would be tempted to use a volatile semantic on all reads of the
> lock field (ACCESS_ONCE()).
Since its all separated by the compiler barrier all the reads should be
contained and the compiler is not allowed to re-read once outside.
So I don't see the point of volatile/ACCESS_ONCE here.
You could make an argument for ACCESS_ONCE(pc->lock) though.
> Secondly, read sequence locks usually use a
> smp_rmb() at the end of the seqcount_begin(), and at the beginning
> of the seqcount_retry(). Moreover, this is usually matched
> by smp_wmb() in write_seqcount begin/end().
Given this is all for self-monitoring and hard assuming the event runs
on the same cpu, smp barriers are pointless.
> Am I missing something special about this lock that makes these
> barriers unnecessary ?
The self-monitoring aspect perhaps? But there's a NOTE in struct
perf_event_mmap_page() that's rather a dead give-away on that though.
next prev parent reply other threads:[~2014-02-05 8:05 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <104831840.19303.1391553779700.JavaMail.zimbra@efficios.com>
2014-02-04 22:56 ` Perf user-space ABI sequence lock memory barriers Mathieu Desnoyers
2014-02-05 8:05 ` Peter Zijlstra [this message]
2014-02-05 20:33 ` Mathieu Desnoyers
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140205080518.GF2936@laptop.programming.kicks-ass.net \
--to=peterz@infradead.org \
--cc=Heinz.Egger@linutronix.de \
--cc=bigeasy@linutronix.de \
--cc=linux-kernel@vger.kernel.org \
--cc=mathieu.desnoyers@efficios.com \
--cc=mingo@kernel.org \
--cc=paulmck@linux.vnet.ibm.com \
--cc=rostedt@goodmis.org \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox