Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp2145129pxb; Sun, 24 Apr 2022 06:05:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzyJi5V5Y1CJ6V4wP4eqaY791FBMXJ4IcXrW/AOw2/j00ETLI2opzBPakWup36E63dDFJ0W X-Received: by 2002:a05:6a00:23d2:b0:4fa:f262:719 with SMTP id g18-20020a056a0023d200b004faf2620719mr14331518pfc.4.1650805545798; Sun, 24 Apr 2022 06:05:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650805545; cv=none; d=google.com; s=arc-20160816; b=iXVggPK1DWVZGLtGOD/MVk8/yA6HPNbQiq9p9HdYawxaCGS5eBe7+RpRXIwueHx9TM a17xfbuN7mwUyTu3PoI0ZwEQVFu7Ju8QG/SldPfdUAysf/bcQSRiLSDv3X8tDeAdCfiD YI19obZvyIo3v+0UwKIBALHaObBDkl3sy5zLvNeOT1D5YH8stq7MiUdtBXj5dQ2hgSQS ZSPtT2nv4fAiCyVsH0jkOLTka/YO6dKz/YLvD9TX+ZZhWUPatX8xOjJoei3683hPl8yR 1Wc6Ryo/HNyYV2/twzrgj54aW/hnkLGBBqFzduTUkT+5phXAFF/7G+ln39SI6Tp+7t+V Az4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=ni6Gei4x1sgDyTNx3AOakonWgaqklWCKyU0FgG9gJAQ=; b=hUR01EboSAjzRppLsGmlUkW3eEkwdBUq6HNFpI6CMHY5m4S0n23ULMmtW0sr06X01N cXyQVQmpwp8dK37keQDcGPC7eGjaveUhAKqFzxWxBVfiCG/HhPExxTCORBAyp6qGL56k wTRqjzhqlUxgJFqIymhKLOqewWkTnCymCWPrCZuQ52PumYanSNZ2XxFfZAoGwHvY8IxI 0IZrhiBYvGNanmDOYjYSRHRtMZvTKDwRZ3mO5+/A82xhg9mRsN2bdjsK6rKLuIYvA4BQ TqeoE9LLapHOsAlSo1V0aSOGuxYcAQlbZXcEueCQBRr58lOZpCOeZkSgQ+GjyY3wDkuu LEwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=agVTAWUW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o8-20020a63e348000000b0039e2b6aacbdsi13813707pgj.475.2022.04.24.06.05.28; Sun, 24 Apr 2022 06:05:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=agVTAWUW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238580AbiDXHzW (ORCPT + 99 others); Sun, 24 Apr 2022 03:55:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57146 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235287AbiDXHzV (ORCPT ); Sun, 24 Apr 2022 03:55:21 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33E9C50E2B; Sun, 24 Apr 2022 00:52:21 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B5D31612E1; Sun, 24 Apr 2022 07:52:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 14B92C385AB; Sun, 24 Apr 2022 07:52:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1650786740; bh=RWb7DOXzFvOQCeyxYs1hApMGKdRf9Qsep7TiwZpIx0U=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=agVTAWUWSKXMvOKG4DXnDCOIKpVl8uRrkJaoKqr0mTF7Rf4BzwQSUrcJUw/Sn/zBB WKiABd2/hBhCnk6uXD2iUvaC/0FmpeARWAAdXMhIF4yJ+Ec+BsUQlPq3N28X2Jop24 XXhm7glhG20Zvtl3DT0q8EAVP01Xu8YP9WT8vriTANZcAOrNjVuUDZAiIDoIYeHewH +c2mNY5NNWGMR5OYaqj1pvXb+6eC3AgRa1/ExRi9WvYiSA+1vJs+5uP/pEBjTA3GD8 3tOAHLrKUipocfXTfcm7YsnTDPho4ro/gLgu/jZclyLUYTyfEognPsplq2jjkXTZFt 1DySQQo5kAxJg== Received: by mail-vk1-f180.google.com with SMTP id c4so5814493vkq.9; Sun, 24 Apr 2022 00:52:20 -0700 (PDT) X-Gm-Message-State: AOAM5332GoIKyrpqDEu9M2UXcsbtYTDArgrYuQnY06ZQH5a+qn+HCtMT xI0Bp65hN+wjn9MRvzd3bKtsGyFLQ42eh5wHVjM= X-Received: by 2002:a1f:3085:0:b0:348:e0b6:bd89 with SMTP id w127-20020a1f3085000000b00348e0b6bd89mr3731670vkw.2.1650786738940; Sun, 24 Apr 2022 00:52:18 -0700 (PDT) MIME-Version: 1.0 References: <3f7dd397-2ccd-dfa3-a0ec-dcce6cbc0476@nvidia.com> <41e01514-74ca-84f2-f5cc-2645c444fd8e@nvidia.com> In-Reply-To: From: Guo Ren Date: Sun, 24 Apr 2022 15:52:07 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH V2 0/3] riscv: atomic: Optimize AMO instructions usage To: Boqun Feng Cc: Dan Lustig , Andrea Parri , "Paul E. McKenney" , Arnd Bergmann , Palmer Dabbelt , Mark Rutland , Will Deacon , Peter Zijlstra , linux-arch , Linux Kernel Mailing List , linux-riscv , Guo Ren Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 22, 2022 at 11:11 AM Boqun Feng wrote: > > On Fri, Apr 22, 2022 at 09:56:21AM +0800, Guo Ren wrote: > > On Fri, Apr 22, 2022 at 6:56 AM Boqun Feng wrote: > > > > > > On Thu, Apr 21, 2022 at 05:39:09PM +0800, Guo Ren wrote: > > > > Hi Dan, > > > > > > > > On Thu, Apr 21, 2022 at 1:03 AM Dan Lustig wrote: > > > > > > > > > > On 4/20/2022 1:33 AM, Guo Ren wrote: > > > > > > Thx Dan, > > > > > > > > > > > > On Wed, Apr 20, 2022 at 1:12 AM Dan Lustig wrote: > > > > > >> > > > > > >> On 4/17/2022 12:51 AM, Guo Ren wrote: > > > > > >>> Hi Boqun & Andrea, > > > > > >>> > > > > > >>> On Sun, Apr 17, 2022 at 10:26 AM Boqun Feng wrote: > > > > > >>>> > > > > > >>>> On Sun, Apr 17, 2022 at 12:49:44AM +0800, Guo Ren wrote: > > > > > >>>> [...] > > > > > >>>>> > > > > > >>>>> If both the aq and rl bits are set, the atomic memory operation is > > > > > >>>>> sequentially consistent and cannot be observed to happen before any > > > > > >>>>> earlier memory operations or after any later memory operations in the > > > > > >>>>> same RISC-V hart and to the same address domain. > > > > > >>>>> "0: lr.w %[p], %[c]\n" > > > > > >>>>> " sub %[rc], %[p], %[o]\n" > > > > > >>>>> " bltz %[rc], 1f\n". > > > > > >>>>> - " sc.w.rl %[rc], %[rc], %[c]\n" > > > > > >>>>> + " sc.w.aqrl %[rc], %[rc], %[c]\n" > > > > > >>>>> " bnez %[rc], 0b\n" > > > > > >>>>> - " fence rw, rw\n" > > > > > >>>>> "1:\n" > > > > > >>>>> So .rl + fence rw, rw is over constraints, only using sc.w.aqrl is more proper. > > > > > >>>>> > > > > > >>>> > > > > > >>>> Can .aqrl order memory accesses before and after it (not against itself, > > > > > >>>> against each other), i.e. act as a full memory barrier? For example, can > > > > > >>> From the RVWMO spec description, the .aqrl annotation appends the same > > > > > >>> effect with "fence rw, rw" to the AMO instruction, so it's RCsc. > > > > > >>> > > > > > >>> Not only .aqrl, and I think the below also could be an RCsc when > > > > > >>> sc.w.aq is executed: > > > > > >>> A: Pre-Access > > > > > >>> B: lr.w.rl ADDR-0 > > > > > >>> ... > > > > > >>> C: sc.w.aq ADDR-0 > > > > > >>> D: Post-Acess > > > > > >>> Because sc.w.aq has overlap address & data dependency on lr.w.rl, the > > > > > >>> global memory order should be A->B->C->D when sc.w.aq is executed. For > > > > > >>> the amoswap > > > > > >> > > > > > >> These opcodes aren't actually meaningful, unfortunately. > > > > > >> > > > > > >> Quoting the ISA manual chapter 10.2: "Software should not set the rl bit > > > > > >> on an LR instruction unless the aq bit is also set, nor should software > > > > > >> set the aq bit on an SC instruction unless the rl bit is also set." > > > > > > 1. Oh, I've missed the behind half of the ISA manual. But why can't we > > > > > > utilize lr.rl & sc.aq in software programming to guarantee the > > > > > > sequence? > > > > > > > > > > lr.aq and sc.rl map more naturally to hardware than lr.rl and sc.aq. > > > > > Plus, they just aren't common operations to begin with, e.g., there > > > > > is no smp_store_acquire() or smp_load_release(), nor are there > > > > > equivalents in C/C++ atomics. > > > > First, thx for pointing out that my patch violates the rules defined > > > > in the ISA manual. I've abandoned these parts in v3. > > > > > > > > It's easy to let hw support lr.rl & sc.aq (eg: our hardware supports > > > > them). I agree there are no equivalents in C/C++ atomics. But they are > > > > useful for LR/SC pairs to implement atomic_acqurie/release semantics. > > > > Compare below: > > > > A): fence rw, r; lr > > > > B): lr.rl > > > > The A has another "fence ,r" effect in semantics, it's over commit > > > > from a software design view. > > > > > > > > ps: Current definition has problems: > > > > #define RISCV_ACQUIRE_BARRIER "\tfence r , rw\n" > > > > #define RISCV_RELEASE_BARRIER "\tfence rw, w\n" > > > > > > > > #define __cmpxchg_release(ptr, old, new, size) \ > > > > ... > > > > __asm__ __volatile__ ( \ > > > > RISCV_RELEASE_BARRIER \ > > > > "0: lr.w %0, %2\n" \ > > > > > > > > That means "fence rw, w" can't prevent lr.w beyond the fence, we need > > > > a "fence.rw. r" here. Here is the Fixup patch which I'm preparing: > > > > > > > > > > That's not true. Note that RELEASE semantics only applies to the > > > write/store part of a read-modify-write atomic, similarly, ACQUIRE only > > I just want to point out that the "atomic" mentioned here is only for > > RISC-V LR/SC AMO instructions. It has been clarified to tread AMO > > instruction as the whole part for other AMO instructions. > > > > - .aq: If the aq bit is set, then no later memory operations > > in this RISC-V hart can be observed to take place > > before the AMO. > > - .rl: If the rl bit is set, then other RISC-V harts will not > > observe the AMO before memory accesses preceding the > > AMO in this RISC-V hart. > > - .aqrl: Setting both the aq and the rl bit on an AMO makes the > > sequence sequentially consistent, meaning that it cannot > > be reordered with earlier or later memory operations > > from the same hart. > > > > > applies to the read/load part. For example, the following litmus test > > > can observe the exists clause being true. > > Thx for pointing out, that means changing "fence rw, w" to "fence rw. > > r" is more strict and it would lower performance, right? > > Yes, I think it's more strict but honestly I don't know the performance > impact ;-) > > > > > > > > > {} > > > > > > P0(int *x, int *y) > > > { > > > int r0; > > > int r1; > > > > > > r0 = cmpxchg_acquire(x, 0, 1); > > > r1 = READ_ONCE(*y); > > Oh, READ_ONCE could be beyond the write/store part of cmpxchg_acquire, > > right? We shouldn't prevent it. > > Right, the reordering is allowed by the API of Linux atomics and you > don't have to prevent it. Thx, you are right, I got it. > > Regards, > Boqun > > > > > > } > > > > > > P1(int *x, int *y) > > > { > > > int r0; > > > > > > WRITE_ONCE(*y, 1); > > > smp_mb(); > > > r0 = READ_ONCE(*x); > > > } > > > > > > exists (0:r0=0 /\ 0:r1=0 /\ 1:r0=0) > > > > > > Regards, > > > Boqun > > > > > > > From 14c93aca0c3b10cf134791cf491b459972a36ec4 Mon Sep 17 00:00:00 2001 > > > > From: Guo Ren > > > > Date: Thu, 21 Apr 2022 16:44:48 +0800 > > > > Subject: [PATCH] riscv: atomic: Fixup wrong __atomic_acquire/release_fence > > > > implementation > > > > > > > > Current RISCV_ACQUIRE/RELEASE_BARRIER is for spin_lock not atomic. > > > > > > > > __cmpxchg_release(ptr, old, new, size) > > > > ... > > > > __asm__ __volatile__ ( > > > > RISCV_RELEASE_BARRIER > > > > "0: lr.w %0, %2\n" > > > > > > > > The "fence rw, w -> lr.w" is invalid and lr would beyond fence, so > > > > we need "fence rw, r -> lr.w" here. Atomic acquire is the same. > > > > > > > > Fixes: 0123f4d76ca6 ("riscv/spinlock: Strengthen implementations with fences") > > > > Signed-off-by: Guo Ren > > > > Signed-off-by: Guo Ren > > > > Cc: Palmer Dabbelt > > > > Cc: Mark Rutland > > > > Cc: Andrea Parri > > > > Cc: Dan Lustig > > > > Cc: stable@vger.kernel.org > > > > --- > > > > arch/riscv/include/asm/atomic.h | 4 ++-- > > > > arch/riscv/include/asm/cmpxchg.h | 8 ++++---- > > > > arch/riscv/include/asm/fence.h | 4 ++++ > > > > 3 files changed, 10 insertions(+), 6 deletions(-) > > > > > > > > diff --git a/arch/riscv/include/asm/atomic.h b/arch/riscv/include/asm/atomic.h > > > > index aef8aa9ac4f4..7cd66eba6ec3 100644 > > > > --- a/arch/riscv/include/asm/atomic.h > > > > +++ b/arch/riscv/include/asm/atomic.h > > > > @@ -20,10 +20,10 @@ > > > > #include > > > > > > > > #define __atomic_acquire_fence() \ > > > > - __asm__ __volatile__(RISCV_ACQUIRE_BARRIER "" ::: "memory") > > > > + __asm__ __volatile__(RISCV_ATOMIC_ACQUIRE_BARRIER "":::"memory") > > > > > > > > #define __atomic_release_fence() \ > > > > - __asm__ __volatile__(RISCV_RELEASE_BARRIER "" ::: "memory"); > > > > + __asm__ __volatile__(RISCV_ATOMIC_RELEASE_BARRIER"" ::: "memory"); > > > > > > > > static __always_inline int arch_atomic_read(const atomic_t *v) > > > > { > > > > diff --git a/arch/riscv/include/asm/cmpxchg.h b/arch/riscv/include/asm/cmpxchg.h > > > > index 9269fceb86e0..605edc2fca3b 100644 > > > > --- a/arch/riscv/include/asm/cmpxchg.h > > > > +++ b/arch/riscv/include/asm/cmpxchg.h > > > > @@ -217,7 +217,7 @@ > > > > " bne %0, %z3, 1f\n" \ > > > > " sc.w %1, %z4, %2\n" \ > > > > " bnez %1, 0b\n" \ > > > > - RISCV_ACQUIRE_BARRIER \ > > > > + RISCV_ATOMIC_ACQUIRE_BARRIER \ > > > > "1:\n" \ > > > > : "=&r" (__ret), "=&r" (__rc), "+A" (*__ptr) \ > > > > : "rJ" ((long)__old), "rJ" (__new) \ > > > > @@ -229,7 +229,7 @@ > > > > " bne %0, %z3, 1f\n" \ > > > > " sc.d %1, %z4, %2\n" \ > > > > " bnez %1, 0b\n" \ > > > > - RISCV_ACQUIRE_BARRIER \ > > > > + RISCV_ATOMIC_ACQUIRE_BARRIER \ > > > > "1:\n" \ > > > > : "=&r" (__ret), "=&r" (__rc), "+A" (*__ptr) \ > > > > : "rJ" (__old), "rJ" (__new) \ > > > > @@ -259,7 +259,7 @@ > > > > switch (size) { \ > > > > case 4: \ > > > > __asm__ __volatile__ ( \ > > > > - RISCV_RELEASE_BARRIER \ > > > > + RISCV_ATOMIC_RELEASE_BARRIER \ > > > > "0: lr.w %0, %2\n" \ > > > > " bne %0, %z3, 1f\n" \ > > > > " sc.w %1, %z4, %2\n" \ > > > > @@ -271,7 +271,7 @@ > > > > break; \ > > > > case 8: \ > > > > __asm__ __volatile__ ( \ > > > > - RISCV_RELEASE_BARRIER \ > > > > + RISCV_ATOMIC_RELEASE_BARRIER \ > > > > "0: lr.d %0, %2\n" \ > > > > " bne %0, %z3, 1f\n" \ > > > > " sc.d %1, %z4, %2\n" \ > > > > diff --git a/arch/riscv/include/asm/fence.h b/arch/riscv/include/asm/fence.h > > > > index 2b443a3a487f..4e446d64f04f 100644 > > > > --- a/arch/riscv/include/asm/fence.h > > > > +++ b/arch/riscv/include/asm/fence.h > > > > @@ -4,9 +4,13 @@ > > > > #ifdef CONFIG_SMP > > > > #define RISCV_ACQUIRE_BARRIER "\tfence r , rw\n" > > > > #define RISCV_RELEASE_BARRIER "\tfence rw, w\n" > > > > +#define RISCV_ATOMIC_ACQUIRE_BARRIER "\tfence w , rw\n" > > > > +#define RISCV_ATOMIC_RELEASE_BARRIER "\tfence rw, r\n" > > > > #else > > > > #define RISCV_ACQUIRE_BARRIER > > > > #define RISCV_RELEASE_BARRIER > > > > +#define RISCV_ATOMIC_ACQUIRE_BARRIER > > > > +#define RISCV_ATOMIC_RELEASE_BARRIER > > > > #endif > > > > > > > > #endif /* _ASM_RISCV_FENCE_H */ > > > > > > > > > > > > > > > > > > > 2. Using .aqrl to replace the fence rw, rw is okay to ISA manual, > > > > > > right? And reducing a fence instruction to gain better performance: > > > > > > "0: lr.w %[p], %[c]\n" > > > > > > " sub %[rc], %[p], %[o]\n" > > > > > > " bltz %[rc], 1f\n". > > > > > > - " sc.w.rl %[rc], %[rc], %[c]\n" > > > > > > + " sc.w.aqrl %[rc], %[rc], %[c]\n" > > > > > > " bnez %[rc], 0b\n" > > > > > > - " fence rw, rw\n" > > > > > > > > > > Yes, using .aqrl is valid. > > > > Thx and I think the below is also valid, right? > > > > > > > > - RISCV_RELEASE_BARRIER \ > > > > - " amoswap.w %0, %2, %1\n" \ > > > > + " amoswap.w.rl %0, %2, %1\n" \ > > > > > > > > - " amoswap.d %0, %2, %1\n" \ > > > > - RISCV_ACQUIRE_BARRIER \ > > > > + " amoswap.d.aq %0, %2, %1\n" \ > > > > > > > > > > > > > > Dan > > > > > > > > > > >> > > > > > >> Dan > > > > > >> > > > > > >>> The purpose of the whole patchset is to reduce the usage of > > > > > >>> independent fence rw, rw instructions, and maximize the usage of the > > > > > >>> .aq/.rl/.aqrl aonntation of RISC-V. > > > > > >>> > > > > > >>> __asm__ __volatile__ ( \ > > > > > >>> "0: lr.w %0, %2\n" \ > > > > > >>> " bne %0, %z3, 1f\n" \ > > > > > >>> " sc.w.rl %1, %z4, %2\n" \ > > > > > >>> " bnez %1, 0b\n" \ > > > > > >>> " fence rw, rw\n" \ > > > > > >>> "1:\n" \ > > > > > >>> > > > > > >>>> we end up with u == 1, v == 1, r1 on P0 is 0 and r1 on P1 is 0, for the > > > > > >>>> following litmus test? > > > > > >>>> > > > > > >>>> C lr-sc-aqrl-pair-vs-full-barrier > > > > > >>>> > > > > > >>>> {} > > > > > >>>> > > > > > >>>> P0(int *x, int *y, atomic_t *u) > > > > > >>>> { > > > > > >>>> int r0; > > > > > >>>> int r1; > > > > > >>>> > > > > > >>>> WRITE_ONCE(*x, 1); > > > > > >>>> r0 = atomic_cmpxchg(u, 0, 1); > > > > > >>>> r1 = READ_ONCE(*y); > > > > > >>>> } > > > > > >>>> > > > > > >>>> P1(int *x, int *y, atomic_t *v) > > > > > >>>> { > > > > > >>>> int r0; > > > > > >>>> int r1; > > > > > >>>> > > > > > >>>> WRITE_ONCE(*y, 1); > > > > > >>>> r0 = atomic_cmpxchg(v, 0, 1); > > > > > >>>> r1 = READ_ONCE(*x); > > > > > >>>> } > > > > > >>>> > > > > > >>>> exists (u=1 /\ v=1 /\ 0:r1=0 /\ 1:r1=0) > > > > > >>> I think my patchset won't affect the above sequence guarantee. Current > > > > > >>> RISC-V implementation only gives RCsc when the original value is the > > > > > >>> same at least once. So I prefer RISC-V cmpxchg should be: > > > > > >>> > > > > > >>> > > > > > >>> - "0: lr.w %0, %2\n" \ > > > > > >>> + "0: lr.w.rl %0, %2\n" \ > > > > > >>> " bne %0, %z3, 1f\n" \ > > > > > >>> " sc.w.rl %1, %z4, %2\n" \ > > > > > >>> " bnez %1, 0b\n" \ > > > > > >>> - " fence rw, rw\n" \ > > > > > >>> "1:\n" \ > > > > > >>> + " fence w, rw\n" \ > > > > > >>> > > > > > >>> To give an unconditional RSsc for atomic_cmpxchg. > > > > > >>> > > > > > >>>> > > > > > >>>> Regards, > > > > > >>>> Boqun > > > > > >>> > > > > > >>> > > > > > >>> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > Best Regards > > > > Guo Ren > > > > > > > > ML: https://lore.kernel.org/linux-csky/ > > > > > > > > -- > > Best Regards > > Guo Ren > > > > ML: https://lore.kernel.org/linux-csky/ -- Best Regards Guo Ren ML: https://lore.kernel.org/linux-csky/