Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp2098630pxu; Sat, 17 Oct 2020 11:27:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJziNPNd4bmdaXhsEFBo3wienvTMViEUyaKF9iyX1y0lbeuq+NoXm4l1hlnXfIbfRMPEgnpT X-Received: by 2002:a17:906:e0d7:: with SMTP id gl23mr9434701ejb.126.1602959246222; Sat, 17 Oct 2020 11:27:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602959246; cv=none; d=google.com; s=arc-20160816; b=zh60+v8EHDfq649F4oYzULORGmIp+XAeAxHKh5Qreu0RHpxQ7WauFLnNDUH5/XZtL2 wUyVpLrd6owZkP+zmyHtrU+JnkmID0YuHDilKsndmt4c5y2u+qtaFDJL1V4fkGxvblek qGx7BPFRD38RQrr0GoR2S3J6K9+xgq2GI5oRZPBsjVDCxN43wI1Y1xd8gdy8eWfFwItp iyrk0xAzMF4IWZwxMM2kGu2z7BFPu9FGUxSHR6y4PYESzuoQc9c8MvUpeyotpDRmiq2k R5ghhViHIXOXMZtvTlqrj145UcEui6HtmljAY41o0WI7SPjTKLJ4Wa9G/0WdVWFo84gE xQsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=56wT1BUpx1ZRofROCpJAQ4HWghK9AW22SV7BKKa7krA=; b=OLtzzRL+iNpUs6F5l1um3pNF6LvpPKMZR1uZgagAHDfrE2+2OCuvcNFh1ZtjhdDctJ NpITiy9HqSTNWWwGTzheuyHTa7Yzenhjogs8y4atKagoV8KIN0xQ/drGdGzzuOzeuGzd Zno20aaW1E01AXnRmgigG2y84VTMxXhF4ty5pKQB6SrEs1Ml9mFqDWLatWns3SsG6MPJ 1j9bfYYKWG9KKIg3Gq+6V2+wFWxmCCaOHIyjDcJxTRsE0WZkBf477dkSOIqvhm5eP0Kg tItRGECQ/NcV40BFOeoufMr6Wy/LRFDnnerVjzSEyahgXYgQkQsN3FbK1Mrg1MIAkFJs lDvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h1si4253690ejx.541.2020.10.17.11.26.55; Sat, 17 Oct 2020 11:27:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437682AbgJQObq (ORCPT + 99 others); Sat, 17 Oct 2020 10:31:46 -0400 Received: from netrider.rowland.org ([192.131.102.5]:52649 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S2411469AbgJQObp (ORCPT ); Sat, 17 Oct 2020 10:31:45 -0400 Received: (qmail 836196 invoked by uid 1000); 17 Oct 2020 10:31:44 -0400 Date: Sat, 17 Oct 2020 10:31:44 -0400 From: Alan Stern To: joel@joelfernandes.org Cc: Frederic Weisbecker , linux-kernel@vger.kernel.org, Ingo Molnar , Josh Triplett , Lai Jiangshan , Marco Elver , Mathieu Desnoyers , "Paul E. McKenney" , rcu@vger.kernel.org, Steven Rostedt , "Uladzislau Rezki \(Sony\)" , fweisbec@gmail.com, neeraj.iitr10@gmail.com Subject: Re: [PATCH v7 6/6] rcu/segcblist: Add additional comments to explain smp_mb() Message-ID: <20201017143144.GA835860@rowland.harvard.edu> References: <20201015002301.101830-1-joel@joelfernandes.org> <20201015002301.101830-7-joel@joelfernandes.org> <20201015133511.GB127222@lothringen> <20201017012753.GB4015033@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201017012753.GB4015033@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 16, 2020 at 09:27:53PM -0400, joel@joelfernandes.org wrote: > Adding Alan as well as its memory barrier discussion ;-) I don't know the internals of how RCU works, so I'll just speak to the litmus test itself, ignoring issues of whether the litmus test is appropriate or expresses what you really want. > The following litmus test would confirm it: > > C rcubarrier+ctrldep > > (* > * Result: Never > * > * This litmus test shows that rcu_barrier (P1) prematurely > * returning by reading len 0 can cause issues if P0 does > * NOT have a smb_mb() before WRITE_ONCE(). > * > * mod_data == 2 means garbage which the callback should never see. > *) > > { int len = 1; } > > P0(int *len, int *mod_data) > { > int r0; > > // accessed by say RCU callback in rcu_do_batch(); > r0 = READ_ONCE(*mod_data); > smp_mb(); // Remove this and the "exists" will become true. > WRITE_ONCE(*len, 0); > } > > P1(int *len, int *mod_data) > { > int r0; > > r0 = READ_ONCE(*len); > > // rcu_barrier will return early if len is 0 > if (r0 == 0) > WRITE_ONCE(*mod_data, 2); > } > > // Is it possible? > exists (0:r0=2 /\ 1:r0=0) This result is indeed not possible. And yes, some sort of memory barrier is needed in P0. But it doesn't have to be smp_mb(); you could use a weaker barrier instead. For example, you could replace the READ_ONCE in P0 with smp_load_acquire(), or you could replace the WRITE_ONCE with smp_store_release(). Either of those changes would suffice to prevent this outcome. Alan