Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp171557imu; Wed, 12 Dec 2018 14:22:11 -0800 (PST) X-Google-Smtp-Source: AFSGD/UHbgzrzR9ThiEIrLdlTTCv6VFIX+etsGGmca8Ze/x+YySZk6n1+n/QyhjSA6zWcwAt98Lf X-Received: by 2002:a17:902:15a8:: with SMTP id m37mr21779687pla.129.1544653331352; Wed, 12 Dec 2018 14:22:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544653331; cv=none; d=google.com; s=arc-20160816; b=MlO7P2q/5gQFz3iT1xEbXH/ZBRzbdA7qUDaF5n368ZKPr7juNXJG80w+irdMhrbTBW dwDLvcxK5R3C2EO0Mk4+u/iucYZQEbVsyVOt3dYkHXq/jN0qJ2+Q+0R8Jo0ZiMM7yCfZ BDn+ytGNCDcSX+TyhePb3QOivpAirIAgpwe+LCKv9lyAM/i4XtNcuNoob9YK70LKzIDd tsJKN1c/8OlxiruPSQtCijaLKNq2IhGyLo1Ghkndw/C+cKtoqw7dnwCDELC/JiN3+Ls+ BWyJK+RyBQi7hdg7Y8duUGbhj3M/ohud/7QgMl9mPWz7pcs/wULKLD0JOsmcXbXI/Gzq 7Ngw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:subject:cc:to :from:date; bh=Db0dlUFLgsljrQDParZPZLJAdp2LuWaD5IwVZaf3Utw=; b=RQiCCWvXKXaPI7QlFLROQuBfTFh3zCuBEBHkcpVyzf/g7KAL9zmfOqJIkCJTtHUdig dzsbrnbpMPaNF9jRlYLM9U0n04MmPGbuiOwDqm8B9hMjwxmHy6dtIjIL4KxnGng1KgWN JexdG6v+DMWLGe8wdYeS5nz+YjbSbnz80aUzZPIvWiaY5mutxyF7BvzVYmt2Xv297Stq Wu/bhVwTOWDZ1XiS2j/kHisuU/zqSh2qGZEyVLYKG8k02Ch2KLH1SbVFExpyLlAbymFW tfFq7K05QcbgIAy25bJCLlDPVfxZ9eXyGIOhsAbf9SMDNIkOpUDwv9PZpdTr2a/0p2c3 OCKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c10si22073pgt.222.2018.12.12.14.21.56; Wed, 12 Dec 2018 14:22:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728716AbeLLWTd (ORCPT + 99 others); Wed, 12 Dec 2018 17:19:33 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:36794 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728509AbeLLWT2 (ORCPT ); Wed, 12 Dec 2018 17:19:28 -0500 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wBCM9UdT102046 for ; Wed, 12 Dec 2018 17:19:27 -0500 Received: from e13.ny.us.ibm.com (e13.ny.us.ibm.com [129.33.205.203]) by mx0a-001b2d01.pphosted.com with ESMTP id 2pbamj19hy-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 12 Dec 2018 17:19:27 -0500 Received: from localhost by e13.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 12 Dec 2018 22:19:26 -0000 Received: from b01cxnp22034.gho.pok.ibm.com (9.57.198.24) by e13.ny.us.ibm.com (146.89.104.200) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 12 Dec 2018 22:19:20 -0000 Received: from b01ledav003.gho.pok.ibm.com (b01ledav003.gho.pok.ibm.com [9.57.199.108]) by b01cxnp22034.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id wBCMJJPx19136660 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 12 Dec 2018 22:19:19 GMT Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D26C5B2064; Wed, 12 Dec 2018 22:19:19 +0000 (GMT) Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9FD3CB205F; Wed, 12 Dec 2018 22:19:19 +0000 (GMT) Received: from paulmck-ThinkPad-W541 (unknown [9.70.82.38]) by b01ledav003.gho.pok.ibm.com (Postfix) with ESMTP; Wed, 12 Dec 2018 22:19:19 +0000 (GMT) Received: by paulmck-ThinkPad-W541 (Postfix, from userid 1000) id A3C1916C6032; Wed, 12 Dec 2018 14:19:20 -0800 (PST) Date: Wed, 12 Dec 2018 14:19:20 -0800 From: "Paul E. McKenney" To: Alan Stern Cc: David Goldblatt , mathieu.desnoyers@efficios.com, Florian Weimer , triegel@redhat.com, libc-alpha@sourceware.org, andrea.parri@amarulasolutions.com, will.deacon@arm.com, peterz@infradead.org, boqun.feng@gmail.com, npiggin@gmail.com, dhowells@redhat.com, j.alglave@ucl.ac.uk, luc.maranget@inria.fr, akiyks@gmail.com, dlustig@nvidia.com, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] Linux: Implement membarrier function Reply-To: paulmck@linux.ibm.com References: <20181212194225.GB4170@linux.ibm.com> <20181212215245.GC4170@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181212215245.GC4170@linux.ibm.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 18121222-0064-0000-0000-000003855046 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00010216; HX=3.00000242; KW=3.00000007; PH=3.00000004; SC=3.00000270; SDB=6.01130874; UDB=6.00587668; IPR=6.00911007; MB=3.00024673; MTD=3.00000008; XFM=3.00000015; UTC=2018-12-12 22:19:25 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18121222-0065-0000-0000-00003BA8007B Message-Id: <20181212221920.GA23239@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-12-12_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=624 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812120188 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 12, 2018 at 01:52:45PM -0800, Paul E. McKenney wrote: > On Wed, Dec 12, 2018 at 04:32:50PM -0500, Alan Stern wrote: > > On Wed, 12 Dec 2018, Paul E. McKenney wrote: > > > > > OK. How about this one? > > > > > > P0 P1 P2 P3 > > > Wa=2 rcu_read_lock() Wc=2 Wd=2 > > > memb Wb=2 Rd=0 synchronize_rcu(); > > > Rb=0 Rc=0 Ra=0 > > > rcu_read_unlock() > > > > > > The model should say that it is allowed. Taking a look... > > > > > > P0 P1 P2 P3 > > > Rd=0 > > > Wd=2 > > > synchronize_rcu(); > > > Ra=0 > > > Wa=2 > > > membs > > > rcu_read_lock() > > > [m01] > > > Rc=0 > > > Wc=2 > > > [m02] [m03] > > > membe > > > Rb=0 > > > Wb=2 > > > rcu_read_unlock() > > > > > > Looks allowed to me. If the synchronization of P1 and P2 were > > > interchanged, it should be forbidden: > > > > > > P0 P1 P2 P3 > > > Wa=2 Wb=2 rcu_read_lock() Wd=2 > > > memb Rc=0 Wc=2 synchronize_rcu(); > > > Rb=0 Rd=0 Ra=0 > > > rcu_read_unlock() > > > > > > Taking a look... > > > > > > P0 P1 P2 P3 > > > rcu_read_lock() > > > Rd=0 > > > Wa=2 Wb=2 Wd=2 > > > membs synchronize_rcu(); > > > [m01] > > > Rc=0 > > > Wc=2 > > > rcu_read_unlock() > > > [m02] Ra=0 [Forbidden?] > > > membe > > > Rb=0 > > For one thing, Wb=2 needs to be down here, apologies! Which then ... > > > Have you tried writing these as real litmus tests and running them > > through herd? > > That comes later, but yes, I will do that. > > > > I believe that this ordering forbids the cycle: > > > > > > Wa=1 > membs -> [m01] -> Rc=0 -> Wc=2 -> rcu_read_unlock() -> > > > return from synchronize_rcu() -> Ra > > > > > > Does this make sense, or am I missing something? > > > > It's hard to tell. What you have written here isn't justified by the > > litmus test source code, since the position of m01 in P1's program > > order is undetermined. How do you justify m01 -> Rc, for example? > > ... justifies Rc=0 following [m01]. > > > Write it this way instead, using the relations defined in the > > sys_membarrier patch for linux-kernel.cat: > > > > memb ->memb-gp memb ->rcu-link Rc ->memb-rscsi Rc ->rcu-link > > > > rcu_read_unlock ->rcu-rscsi rcu_read_lock ->rcu-link > > > > synchronize_rcu ->rcu-gp synchronize_rcu ->rcu-link memb > > > > Recall that: > > > > memb-gp is the identity relation on sys_membarrier events, > > > > rcu-link includes (po? ; fre ; po), > > > > memb-rscsi is the identity relation on all events, > > > > rcu-rscsi links unlocks to their corresponding locks, and > > > > rcu-gp is the identity relation on synchronize_rcu events. > > > > These facts justify the cycle above. > > > > Leaving off the final rcu-link step, the sequence matches the > > definition of rcu-fence (the relations are memb-gp, memb-rscsi, > > rcu-rscsi, rcu-gp with rcu-links in between). Therefore the cycle is > > forbidden. > > Understood, but that would be using the model to check the model. ;-) And here are the litmus tests in the same order as above. They do give the results we both called out above, which is encouraging. Thanx, Paul ------------------------------------------------------------------------ C C-memb-RCU-1 (* * Result: Sometimes *) { } P0(int *x0, int *x1) { WRITE_ONCE(*x0, 1); smp_memb(); r1 = READ_ONCE(*x1); } P1(int *x1, int *x2) { rcu_read_lock(); WRITE_ONCE(*x1, 1); r1 = READ_ONCE(*x2); rcu_read_unlock(); } P2(int *x2, int *x3) { WRITE_ONCE(*x2, 1); r1 = READ_ONCE(*x3); } P3(int *x3, int *x0) { WRITE_ONCE(*x3, 1); synchronize_rcu(); r1 = READ_ONCE(*x0); } exists (0:r1=0 /\ 1:r1=0 /\ 2:r1=0 /\ 3:r1=0) ------------------------------------------------------------------------ C C-memb-RCU-1 (* * Result: Never *) { } P0(int *x0, int *x1) { WRITE_ONCE(*x0, 1); smp_memb(); r1 = READ_ONCE(*x1); } P1(int *x1, int *x2) { WRITE_ONCE(*x1, 1); r1 = READ_ONCE(*x2); } P2(int *x2, int *x3) { rcu_read_lock(); WRITE_ONCE(*x2, 1); r1 = READ_ONCE(*x3); rcu_read_unlock(); } P3(int *x3, int *x0) { WRITE_ONCE(*x3, 1); synchronize_rcu(); r1 = READ_ONCE(*x0); } exists (0:r1=0 /\ 1:r1=0 /\ 2:r1=0 /\ 3:r1=0)