Received: by 2002:a17:90b:8d0:0:0:0:0 with SMTP id ds16csp205315pjb; Thu, 16 Jul 2020 11:59:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpjYYUX8ii7G/M2r0PWDWaFbLk6XTCGfhC7N6OjssVldTJumU/mflPnd1DeRet0tmV521u X-Received: by 2002:a17:906:9147:: with SMTP id y7mr4769907ejw.399.1594925956441; Thu, 16 Jul 2020 11:59:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594925956; cv=none; d=google.com; s=arc-20160816; b=ItWHxaZd72d3bSC9NoI260xyfkS5OAUihDXI4tMczrWqWv/Au540W9uC11ZbJdRMQ4 jVe5YgxQxgHLXjlKm9iyWKsVluhYvqW98d3ifz9S1D4LHLgJLnLzUORS/A2d2ckm+jNa 49EQD9ZZtPJVdFBzQ0vFPQ1EOwS5mJLN5jnqijm4GDpd1T7cqPLLswW29srURJQdMY9H U+Eho4rmsUVEF4qERZWY26G4fLn1cVWDGON5tDqQgQlB15iP9vJ5NLraRoFsT2vMrS/m OilWhNBuVmqOyjSlaE94qk866Wq06EnllrqSn4KT85KU5dVuK0AJexpd1W/VqgIdKU7R sfLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:dkim-signature:dkim-filter; bh=4y3OZc0uvqLRNtfhBnb/Pl6FBzMj468Y31eGzsZO15Y=; b=uQsYGysLpeAJGXaVv8bG7Ca3xDcyIt1Sdovowh5NrLHflhM4drSIaK53WYPrAGDwk+ pBggnQfGIEMXD/4VbJ9Gggk6VEWf1/n3Q+kNgjwM5lxVo6lW2Xo5UeegGkvO1j5BNjm9 tPSM2R1pcrc0tHePdWzljYygBJjVvZf7kU5GCgSNNeO3L85Rr5fj5aW2BLEX8Y/NSuDY tlEsu8/tiW2VRpW5VqiIl2T666m1E8siUqPNCXhqROCFG0xVZyy7FVm3NDfPifUFlkoX ZwXLhJ/c2uuUZrXSxWq4bHYbsrWl2ZKLi1FURlf+4rOh9uRUMCNLgwLDtMBHejGbXoKw W2tw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=YgwfmSUm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 12si4054901edx.70.2020.07.16.11.58.53; Thu, 16 Jul 2020 11:59:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=YgwfmSUm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729366AbgGPS6o (ORCPT + 99 others); Thu, 16 Jul 2020 14:58:44 -0400 Received: from mail.efficios.com ([167.114.26.124]:59594 "EHLO mail.efficios.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726986AbgGPS6n (ORCPT ); Thu, 16 Jul 2020 14:58:43 -0400 Received: from localhost (localhost [127.0.0.1]) by mail.efficios.com (Postfix) with ESMTP id 2493D297CAB; Thu, 16 Jul 2020 14:58:42 -0400 (EDT) Received: from mail.efficios.com ([127.0.0.1]) by localhost (mail03.efficios.com [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id jho3kzP0Uhx3; Thu, 16 Jul 2020 14:58:41 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by mail.efficios.com (Postfix) with ESMTP id B8552297D0D; Thu, 16 Jul 2020 14:58:41 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.efficios.com B8552297D0D DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=efficios.com; s=default; t=1594925921; bh=4y3OZc0uvqLRNtfhBnb/Pl6FBzMj468Y31eGzsZO15Y=; h=Date:From:To:Message-ID:MIME-Version; b=YgwfmSUmKI5QGNkVW/ZZ4DkKkDfr6+Hx/88oYF+i0AnoO/Z9FhYpe84gUEYocOQZs 9YhXWYkwGT6T1MBDwQSVG52oBQHsCzbEu3te/aG2x3gC6D4Ct4Tg+ZhasUje9+KMDx hU95kX5H6X+56H71ssixg7KPiZhw6SOybRTXFdnfUfURYh5zYw+0WneFlzLtl/t4Tt JN1LzdW1iz+hxNNqnAVpLaaIAAdfyWLN/KTn9tdroxw0L7iCs0t9rq5BBsFGHyBULI j1YpgVOwQwHVBV5Rdk21VIMyt9QZIbAt3Xw3/fbE14m0SXc+CByVsMsZHcPrXKlX/h dYSAnCv5SaUAA== X-Virus-Scanned: amavisd-new at efficios.com Received: from mail.efficios.com ([127.0.0.1]) by localhost (mail03.efficios.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id T-n-DAhdMKvn; Thu, 16 Jul 2020 14:58:41 -0400 (EDT) Received: from mail03.efficios.com (mail03.efficios.com [167.114.26.124]) by mail.efficios.com (Postfix) with ESMTP id A1E69297CA8; Thu, 16 Jul 2020 14:58:41 -0400 (EDT) Date: Thu, 16 Jul 2020 14:58:41 -0400 (EDT) From: Mathieu Desnoyers To: Nicholas Piggin , paulmck , Alan Stern Cc: Anton Blanchard , Arnd Bergmann , linux-arch , linux-kernel , linux-mm , linuxppc-dev , Andy Lutomirski , Peter Zijlstra , x86 Message-ID: <595582123.17106.1594925921537.JavaMail.zimbra@efficios.com> In-Reply-To: <1370747990.15974.1594915396143.JavaMail.zimbra@efficios.com> References: <20200710015646.2020871-1-npiggin@gmail.com> <1594613902.1wzayj0p15.astroid@bobo.none> <1594647408.wmrazhwjzb.astroid@bobo.none> <284592761.9860.1594649601492.JavaMail.zimbra@efficios.com> <1594868476.6k5kvx8684.astroid@bobo.none> <1594873644.viept6os6j.astroid@bobo.none> <1494299304.15894.1594914382695.JavaMail.zimbra@efficios.com> <1370747990.15974.1594915396143.JavaMail.zimbra@efficios.com> Subject: Re: [RFC PATCH 4/7] x86: use exit_lazy_tlb rather than membarrier_mm_sync_core_before_usermode MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [167.114.26.124] X-Mailer: Zimbra 8.8.15_GA_3955 (ZimbraWebClient - FF78 (Linux)/8.8.15_GA_3953) Thread-Topic: x86: use exit_lazy_tlb rather than membarrier_mm_sync_core_before_usermode Thread-Index: cb6zdS0KPjkbq8hxmgetruE+ExgftXKEdKLPFXA9iBY= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- On Jul 16, 2020, at 12:03 PM, Mathieu Desnoyers mathieu.desnoyers@efficios.com wrote: > ----- On Jul 16, 2020, at 11:46 AM, Mathieu Desnoyers > mathieu.desnoyers@efficios.com wrote: > >> ----- On Jul 16, 2020, at 12:42 AM, Nicholas Piggin npiggin@gmail.com wrote: >>> I should be more complete here, especially since I was complaining >>> about unclear barrier comment :) >>> >>> >>> CPU0 CPU1 >>> a. user stuff 1. user stuff >>> b. membarrier() 2. enter kernel >>> c. smp_mb() 3. smp_mb__after_spinlock(); // in __schedule >>> d. read rq->curr 4. rq->curr switched to kthread >>> e. is kthread, skip IPI 5. switch_to kthread >>> f. return to user 6. rq->curr switched to user thread >>> g. user stuff 7. switch_to user thread >>> 8. exit kernel >>> 9. more user stuff >>> >>> What you're really ordering is a, g vs 1, 9 right? >>> >>> In other words, 9 must see a if it sees g, g must see 1 if it saw 9, >>> etc. >>> >>> Userspace does not care where the barriers are exactly or what kernel >>> memory accesses might be being ordered by them, so long as there is a >>> mb somewhere between a and g, and 1 and 9. Right? >> >> This is correct. > > Actually, sorry, the above is not quite right. It's been a while > since I looked into the details of membarrier. > > The smp_mb() at the beginning of membarrier() needs to be paired with a > smp_mb() _after_ rq->curr is switched back to the user thread, so the > memory barrier is between store to rq->curr and following user-space > accesses. > > The smp_mb() at the end of membarrier() needs to be paired with the > smp_mb__after_spinlock() at the beginning of schedule, which is > between accesses to userspace memory and switching rq->curr to kthread. > > As to *why* this ordering is needed, I'd have to dig through additional > scenarios from https://lwn.net/Articles/573436/. Or maybe Paul remembers ? Thinking further about this, I'm beginning to consider that maybe we have been overly cautious by requiring memory barriers before and after store to rq->curr. If CPU0 observes a CPU1's rq->curr->mm which differs from its own process (current) while running the membarrier system call, it necessarily means that CPU1 had to issue smp_mb__after_spinlock when entering the scheduler, between any user-space loads/stores and update of rq->curr. Requiring a memory barrier between update of rq->curr (back to current process's thread) and following user-space memory accesses does not seem to guarantee anything more than what the initial barrier at the beginning of __schedule already provides, because the guarantees are only about accesses to user-space memory. Therefore, with the memory barrier at the beginning of __schedule, just observing that CPU1's rq->curr differs from current should guarantee that a memory barrier was issued between any sequentially consistent instructions belonging to the current process on CPU1. Or am I missing/misremembering an important point here ? Thanks, Mathieu > > Thanks, > > Mathieu > > >> Note that the accesses to user-space memory can be >> done either by user-space code or kernel code, it doesn't matter. >> However, in order to be considered as happening before/after >> either membarrier or the matching compiler barrier, kernel code >> needs to have causality relationship with user-space execution, >> e.g. user-space does a system call, or returns from a system call. >> >> In the case of io_uring, submitting a request or returning from waiting >> on request completion appear to provide this causality relationship. >> >> Thanks, >> >> Mathieu >> >> >> -- >> Mathieu Desnoyers >> EfficiOS Inc. >> http://www.efficios.com > > -- > Mathieu Desnoyers > EfficiOS Inc. > http://www.efficios.com -- Mathieu Desnoyers EfficiOS Inc. http://www.efficios.com