Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3656061ybv; Tue, 25 Feb 2020 05:08:36 -0800 (PST) X-Google-Smtp-Source: APXvYqzqtDyWLQcPZk3KHD+c5P71jlt2bJONJixddw7n56qoXCMRG01+XD7VIKRl5oS55IO5RZrx X-Received: by 2002:a05:6808:8e1:: with SMTP id d1mr3379758oic.68.1582636116688; Tue, 25 Feb 2020 05:08:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582636116; cv=none; d=google.com; s=arc-20160816; b=XBvMsjjT1NQaK/nc9KAokidRyW4d2bALNyQrZVFkJTnoHt3pNbasoooiF6IQT4LIcz OV52o4+snqE+yq+8Fdv/WQylgesLpbiwCfcMiAXvRj+Yar1i+OKj9X5SpV/FG4QROrdl RTzRuQf51mtYxZtOREKJLU16TvS+Hgsbfi2YaWRaFxAShkQSOoItcj7OE6qEXj+9/86J IgGaP/OzVR87o2SOpHS9P0lHimhxJGVzW8+Bwo8m8mVsHGLaT8a+8Qmg2GEV2Nu8mk6t d6fNKWVkJkLaZFInx7tev1TePiLlLN2YgV+/j5fcu0Q3kytlWCWuuZ5J1ZQZywbB+yiJ hgJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:date:from; bh=u7qfEkCgDN1Vhm4vzPGpNCa8BIWP7M2plpNXBKDcjww=; b=nRlmCTMipOiHHFFz2fz6pDdZ5QYq3qzBxkcbnxPFm3QqQxxv5W43JKkNTQgMLD6RKm N3Fms+iDJr46x0ZJWVfja+k4hw9b8qVwz4H8o2JBeobElDz8W8tzqgIkEku+fZoL3ic+ SWZsq/Sl275uAuwdXwTwqeJdbytB+7IW4h8536LE4tIj8DRrbSy8GzuRBVmnljMuVUEr lr1RmEqsU/aj+TPU3p6q4h907w+h0euj0z+OY/JLmQxaVk+HK0mRD0vDCmyUJnNc50iG s0LRtuZ3a2RaxA4tX+JtOuVPFYoWUgk9XQUVElGDG+1BRYpZ9DFoj7goqVKKhguz9jK7 EPZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x197si6701275oix.174.2020.02.25.05.08.21; Tue, 25 Feb 2020 05:08:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729756AbgBYNBG (ORCPT + 99 others); Tue, 25 Feb 2020 08:01:06 -0500 Received: from mail3-relais-sop.national.inria.fr ([192.134.164.104]:11270 "EHLO mail3-relais-sop.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729179AbgBYNBG (ORCPT ); Tue, 25 Feb 2020 08:01:06 -0500 From: Luc Maranget X-IronPort-AV: E=Sophos;i="5.70,484,1574118000"; d="scan'208";a="340371138" Received: from yquem.paris.inria.fr (HELO yquem.inria.fr) ([128.93.101.33]) by mail3-relais-sop.national.inria.fr with ESMTP; 25 Feb 2020 14:01:02 +0100 Received: by yquem.inria.fr (Postfix, from userid 18041) id 65A98E1AAB; Tue, 25 Feb 2020 14:01:02 +0100 (CET) Date: Tue, 25 Feb 2020 14:01:02 +0100 To: Boqun Feng Cc: Andrea Parri , Luc Maranget , linux-kernel@vger.kernel.org, Alan Stern , Will Deacon , Peter Zijlstra , Nicholas Piggin , David Howells , Jade Alglave , "Paul E. McKenney" , Akira Yokosawa , Daniel Lustig , Jonathan Corbet , linux-arch@vger.kernel.org, linux-doc@vger.kernel.org Subject: Re: [RFC 2/3] tools/memory-model: Add a litmus test for atomic_set() Message-ID: <20200225130102.wsz3bpyhjmcru7os@yquem.inria.fr> References: <20200214040132.91934-1-boqun.feng@gmail.com> <20200214040132.91934-3-boqun.feng@gmail.com> <20200214081213.GA17708@andrea> <20200214104003.GC20408@debian-boqun.qqnc3lrjykvubdpftowmye0fmh.lx.internal.cloudapp.net> <20200225073451.GP69864@debian-boqun.qqnc3lrjykvubdpftowmye0fmh.lx.internal.cloudapp.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200225073451.GP69864@debian-boqun.qqnc3lrjykvubdpftowmye0fmh.lx.internal.cloudapp.net> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, As far as I can remember I have implemented atomic_add_unless in herd7. As to your test, I have first run a slightly modified version of your test as a kernel module (using klitmus7). C atomic_add_unless-dependency { atomic_t y = ATOMIC_INIT(1); } P0(int *x, atomic_t *y, int *z) { int r0; r0 = READ_ONCE(*x); if (atomic_add_unless((atomic_t *)y, 2, r0)) WRITE_ONCE(*z, 42); else WRITE_ONCE(*z, 1); } P1(int *x, int *z) { int r0; r0 = smp_load_acquire(z); WRITE_ONCE(*x, 1); } locations [y] exists (1:r0 = 1 /\ 0:r0 = 1) The test is also accepted by herd7, here producing teh same final values as actual run on a raspberry PI4B. --Luc > Luc, > > Could you have a look at the problem Andrea and I discuss here? It seems > that you have done a few things in herd for atomic_add_unless() in > particular, and based on the experiments of Andrea and me, seems > atomic_add_unless() works correctly. So can you confirm that herd now > can handle atomic_add_unless() or there is still something missing? > > Thanks! > > Regards, > Boqun > > On Fri, Feb 14, 2020 at 06:40:03PM +0800, Boqun Feng wrote: > > On Fri, Feb 14, 2020 at 09:12:13AM +0100, Andrea Parri wrote: > > > > @@ -0,0 +1,24 @@ > > > > +C Atomic-set-observable-to-RMW > > > > + > > > > +(* > > > > + * Result: Never > > > > + * > > > > + * Test of the result of atomic_set() must be observable to atomic RMWs. > > > > + *) > > > > + > > > > +{ > > > > + atomic_t v = ATOMIC_INIT(1); > > > > +} > > > > + > > > > +P0(atomic_t *v) > > > > +{ > > > > + (void)atomic_add_unless(v,1,0); > > > > > > We blacklisted this primitive some time ago, cf. section "LIMITATIONS", > > > entry (6b) in tools/memory-model/README; the discussion was here: > > > > > > https://lkml.kernel.org/r/20180829211053.20531-3-paulmck@linux.vnet.ibm.com > > > > > > > And in an email replying to that email, you just tried and seemed > > atomic_add_unless() works ;-) > > > > > but unfortunately I can't remember other details at the moment: maybe > > > it is just a matter of or the proper time to update that section. > > > > > > > I spend a few time looking into the changes in herd, the dependency > > problem seems to be as follow: > > > > For atomic_add_unless(ptr, a, u), the return value (true or false) > > depends on both *ptr and u, this is different than other atomic RMW, > > whose return value only depends on *ptr. Considering the following > > litmus test: > > > > C atomic_add_unless-dependency > > > > { > > int y = 1; > > } > > > > P0(int *x, int *y, int *z) > > { > > int r0; > > int r1; > > int r2; > > > > r0 = READ_ONCE(*x); > > if (atomic_add_unless(y, 2, r0)) > > WRITE_ONCE(*z, 42); > > else > > WRITE_ONCE(*z, 1); > > } > > > > P1(int *x, int *y, int *z) > > { > > int r0; > > > > r0 = smp_load_acquire(z); > > > > WRITE_ONCE(*x, 1); > > } > > > > exists > > (1:r0 = 1 /\ 0:r0 = 1) > > > > , the exist-clause will never trigger, however if we replace > > "atomic_add_unless(y, 2, r0)" with "atomic_add_unless(y, 2, 1)", the > > write on *z and the read from *x on CPU 0 are not ordered, so we could > > observe the exist-clause triggered. > > > > I just tried with the latest herd, and herd can work out this > > dependency. So I think we are good now and can change the limitation > > section in the document. But I will wait for Luc's input for this. Luc, > > did I get this correct? Is there any other limitation on > > atomic_add_unless() now? > > > > Regards, > > Boqun > > > > > Thanks, > > > Andrea