From: Peter Zijlstra <peterz@infradead.org>
To: Andrea Parri <parri.andrea@gmail.com>
Cc: David Howells <dhowells@redhat.com>,
Linus Torvalds <torvalds@linux-foundation.org>,
Will Deacon <will@kernel.org>,
"Paul E. McKenney" <paulmck@linux.ibm.com>,
Mark Rutland <mark.rutland@arm.com>,
Linux List Kernel Mailing <linux-kernel@vger.kernel.org>,
linux-fsdevel <linux-fsdevel@vger.kernel.org>,
Nick Desaulniers <ndesaulniers@google.com>,
jose.marchesi@oracle.com
Subject: Re: Do we need to correct barriering in circular-buffers.rst?
Date: Fri, 27 Sep 2019 14:49:29 +0200 [thread overview]
Message-ID: <20190927124929.GB4643@worktop.programming.kicks-ass.net> (raw)
In-Reply-To: <20190927095107.GA13098@andrea>
On Fri, Sep 27, 2019 at 11:51:07AM +0200, Andrea Parri wrote:
> For the record, the LKMM doesn't currently model "order" derived from
> control dependencies to a _plain_ access (even if the plain access is
> a write): in particular, the following is racy (as far as the current
> LKMM is concerned):
>
> C rb
>
> { }
>
> P0(int *tail, int *data, int *head)
> {
> if (READ_ONCE(*tail)) {
> *data = 1;
> smp_wmb();
> WRITE_ONCE(*head, 1);
> }
> }
>
> P1(int *tail, int *data, int *head)
> {
> int r0;
> int r1;
>
> r0 = READ_ONCE(*head);
> smp_rmb();
> r1 = *data;
> smp_mb();
> WRITE_ONCE(*tail, 1);
> }
>
> Replacing the plain "*data = 1" with "WRITE_ONCE(*data, 1)" (or doing
> s/READ_ONCE(*tail)/smp_load_acquire(tail)) suffices to avoid the race.
> Maybe I'm short of imagination this morning... but I can't currently
> see how the compiler could "break" the above scenario.
The compiler; if sufficiently smart; is 'allowed' to change P0 into
something terrible like:
*data = 1;
if (*tail) {
smp_wmb();
*head = 1;
} else
*data = 0;
(assuming it knows *data was 0 from a prior store or something)
Using WRITE_ONCE() defeats this because volatile indicates external
visibility.
> I also didn't spend much time thinking about it. memory-barriers.txt
> has a section "CONTROL DEPENDENCIES" dedicated to "alerting developers
> using control dependencies for ordering". That's quite a long section
> (and probably still incomplete); the last paragraph summarizes: ;-)
Barring LTO the above works for perf because of inter-translation-unit
function calls, which imply a compiler barrier.
Now, when the compiler inlines, it looses that sync point (and thereby
subtlely changes semantics from the non-inline variant). I suspect LTO
does the same and can cause subtle breakage through this transformation.
> (*) Compilers do not understand control dependencies. It is therefore
> your job to ensure that they do not break your code.
It is one the list of things I want to talk about when I finally get
relevant GCC and LLVM people in the same room ;-)
Ideally the compiler can be taught to recognise conditionals dependent
on 'volatile' loads and disallow problematic transformations around
them.
I've added Nick (clang) and Jose (GCC) on Cc, hopefully they can help
find the right people for us.
next prev parent reply other threads:[~2019-09-27 12:49 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-13 13:00 [RFC][PATCH] pipe: Convert ring to head/tail David Howells
2019-09-13 13:06 ` My just-shovel-data-through-for-X-amount-of-time test David Howells
2019-09-15 14:59 ` [RFC][PATCH] pipe: Convert ring to head/tail Will Deacon
2019-09-17 13:51 ` David Howells
2019-09-17 17:07 ` Will Deacon
2019-09-18 15:43 ` Do we need to correct barriering in circular-buffers.rst? David Howells
2019-09-18 16:48 ` Linus Torvalds
2019-09-19 13:59 ` David Howells
2019-09-19 15:59 ` Linus Torvalds
2019-09-23 14:49 ` Peter Zijlstra
2019-09-27 9:51 ` Andrea Parri
2019-09-27 12:49 ` Peter Zijlstra [this message]
2019-09-27 15:57 ` Peter Zijlstra
2019-09-27 20:43 ` Nick Desaulniers
2019-09-27 21:58 ` Nick Desaulniers
2019-09-30 9:33 ` Peter Zijlstra
2019-09-30 11:54 ` Peter Zijlstra
2019-09-30 12:02 ` Peter Zijlstra
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190927124929.GB4643@worktop.programming.kicks-ass.net \
--to=peterz@infradead.org \
--cc=dhowells@redhat.com \
--cc=jose.marchesi@oracle.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=ndesaulniers@google.com \
--cc=parri.andrea@gmail.com \
--cc=paulmck@linux.ibm.com \
--cc=torvalds@linux-foundation.org \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox