Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1694856rwb; Thu, 19 Jan 2023 14:15:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXu6Wc/klQpPzSqTZhBSPInMIFxxgj4Z/E3/X4IOkhHBH4JB4sMONRaDm3iszdmr59mGE+Ul X-Received: by 2002:a05:6a21:32a9:b0:b8:9127:3e9f with SMTP id yt41-20020a056a2132a900b000b891273e9fmr15365512pzb.53.1674166529691; Thu, 19 Jan 2023 14:15:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674166529; cv=none; d=google.com; s=arc-20160816; b=T7NG395QyjIpHLcA86YsQ3hf//7C2JdKGk2s00zXraQi/mTnHeI7dLA+JBA2ZbuvwF N6kaPgFeeijJO8JzN1auF8a4Ti+zNj86JyhrO6jh60Gfs511+wJk2vf8mYLPCQnmaECo 0Thsuqg0C67K5Jt0YjhuIQvoeH6Z3HG+tLMkD90m6ibyH2oRt21RbbWXrWWzZ74hMkRh 02deSU/TA3QJcIiTrZkLE3Ti7MV74vRg7QXKrRfD/Bc1vynpk9PU0p2LfpNmaWC/JMTv iB2eFVmpZOvLx+lOC8WktqgrFHh6qXyp7OjFGsY0Hrcs3MCageycSbluaVvNjgpyzPaQ QmAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=2v+gx7YsWIKXVoNm08iliXygDBhmJJJ1fB/P4Q6cOpQ=; b=KAJKdEdlaHgFifnbFZk0x61fNyg/IEIG3VDN0hdRaLufbXsEeUbCZnLTyCL/CfEMsj q7oIM36ct79CIsZogeRfepIEnZaVApsP4fU2G3+lwaXKVths4e2jKLxRIYhy3yZdr3E3 rtn1tENlG9i+eD8L/qCrhTJQjNCt5HbfhyPuPRqe+jHQtJYJGMHEpwvwKr+X4yEZySIm dZzGu2eR7oPFmCKuaAzJyCjuMxbsLihIIDD+FPFFX7sZRf7DSiFmrH6MQ9VNVvqlkCgi zxptPUFqKVpr3Pj9GPEWS87xAadZfPp1g5ZeQvuWhxRHcdRXJskZh/LGY34qEKIaRTye SOGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o85FdrZC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j25-20020a635519000000b004610dceef13si39959720pgb.336.2023.01.19.14.15.23; Thu, 19 Jan 2023 14:15:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o85FdrZC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229734AbjASWON (ORCPT + 46 others); Thu, 19 Jan 2023 17:14:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47132 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230133AbjASWNc (ORCPT ); Thu, 19 Jan 2023 17:13:32 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA39A5CFF9 for ; Thu, 19 Jan 2023 13:53:05 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7797F61D5F for ; Thu, 19 Jan 2023 21:53:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF8B1C433D2; Thu, 19 Jan 2023 21:53:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1674165184; bh=quKqZl9P3JBB+x7zw4zVLfYwXlZaDkIsDnE9rmueGOI=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=o85FdrZCfrzYdR8Zw+w/UKwG7i2dFvTp2Nfkj9cL8zY2pNAG73aPt6O7bkJvbc/36 RD7Ng2NTAd8yVq5I5IESsJ4l+j226kFTKDx41PCV+GiV9JTTcvGqHWm+xwqrjpssp7 TWuYalYdA/zxmV8sgnV4xUp1dMYrm9xljK7JZoV02b8c66vqDqZZxxmMWbE1qmQPuk 9EHzu6y3eM2771/Xd4wKwiqDlNbtL/qpdK34THEWo1dDtHCk1+lD6BT1nsEqwcPUwe Qq4o9LdGksy6eTjzl9TNicMPpXtwTPabXbIzgNy0uc4OctzKlSCB7AItVJkE88/djs yIKtvu9h5+uzg== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 789F45C1B07; Thu, 19 Jan 2023 13:53:04 -0800 (PST) Date: Thu, 19 Jan 2023 13:53:04 -0800 From: "Paul E. McKenney" To: Alan Stern Cc: Jonas Oberhauser , Andrea Parri , Jonas Oberhauser , Peter Zijlstra , will , "boqun.feng" , npiggin , dhowells , "j.alglave" , "luc.maranget" , akiyks , dlustig , joel , urezki , quic_neeraju , frederic , Kernel development list Subject: Re: Internal vs. external barriers (was: Re: Interesting LKMM litmus test) Message-ID: <20230119215304.GA2948950@paulmck-ThinkPad-P17-Gen-1> Reply-To: paulmck@kernel.org References: <3dabbcfb-858c-6aa0-6824-05b8cc8e9cdb@gmail.com> <20230118201918.GI2948950@paulmck-ThinkPad-P17-Gen-1> <20230118211201.GL2948950@paulmck-ThinkPad-P17-Gen-1> <09f084d2-6128-7f83-b2a5-cbe236b1678d@huaweicloud.com> <20230119001147.GN2948950@paulmck-ThinkPad-P17-Gen-1> <0fae983b-2a7c-d44e-8881-53d5cc053f09@huaweicloud.com> <20230119184107.GT2948950@paulmck-ThinkPad-P17-Gen-1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 19, 2023 at 02:51:53PM -0500, Alan Stern wrote: > On Thu, Jan 19, 2023 at 10:41:07AM -0800, Paul E. McKenney wrote: > > In contrast, this actually needs srcu_down_read() and srcu_up_read(): > > > > ------------------------------------------------------------------------ > > > > C C-srcu-nest-6 > > > > (* > > * Result: Never > > * > > * Flag unbalanced-srcu-locking > > * This would be valid for srcu_down_read() and srcu_up_read(). > > *) > > > > {} > > > > P0(int *x, int *y, struct srcu_struct *s1, int *idx) > > { > > int r2; > > int r3; > > > > r3 = srcu_down_read(s1); > > WRITE_ONCE(*idx, r3); > > r2 = READ_ONCE(*y); > > } > > > > P1(int *x, int *y, struct srcu_struct *s1, int *idx) > > { > > int r1; > > int r3; > > > > r1 = READ_ONCE(*x); > > r3 = READ_ONCE(*idx); > > srcu_up_read(s1, r3); > > } > > > > P2(int *x, int *y, struct srcu_struct *s1) > > { > > WRITE_ONCE(*y, 1); > > synchronize_srcu(s1); > > WRITE_ONCE(*x, 1); > > } > > > > locations [0:r1] > > exists (1:r1=1 /\ 0:r2=0) > > I modified this litmus test by adding a flag variable with an > smp_store_release in P0, an smp_load_acquire in P1, and a filter clause > to ensure that P1 reads the flag and idx from P1. > > With the patch below, the results were as expected: > > Test C-srcu-nest-6 Allowed > States 3 > 0:r1=0; 0:r2=0; 1:r1=0; > 0:r1=0; 0:r2=1; 1:r1=0; > 0:r1=0; 0:r2=1; 1:r1=1; > No > Witnesses > Positive: 0 Negative: 3 > Condition exists (1:r1=1 /\ 0:r2=0) > Observation C-srcu-nest-6 Never 0 3 > Time C-srcu-nest-6 0.04 > Hash=2b010cf3446879fb84752a6016ff88c5 Fair point, and for example we already recommend emulating call_rcu() using similar release-acquire tricks. > It turns out that the idea of removing rf edges from Srcu-unlock events > doesn't work well. The missing edges mess up herd's calculation of the > fr relation and the coherence axiom. So I've gone back to filtering > those edges out of carry-dep. > > Also, Boqun's suggestion for flagging ordinary accesses to SRCU > structures no longer works, because the lock and unlock operations now > _are_ normal accesses. I removed that check too, but it shouldn't hurt > much because I don't expect to encounter litmus tests that try to read > or write srcu_structs directly. Agreed. I for one would definitely have something to say about an SRCU-usage patch that directly manipulated a srcu_struct structure! ;-) > Alan > > > > Index: usb-devel/tools/memory-model/linux-kernel.bell > =================================================================== > --- usb-devel.orig/tools/memory-model/linux-kernel.bell > +++ usb-devel/tools/memory-model/linux-kernel.bell > @@ -53,38 +53,30 @@ let rcu-rscs = let rec > in matched > > (* Validate nesting *) > -flag ~empty Rcu-lock \ domain(rcu-rscs) as unbalanced-rcu-locking > -flag ~empty Rcu-unlock \ range(rcu-rscs) as unbalanced-rcu-locking > +flag ~empty Rcu-lock \ domain(rcu-rscs) as unbalanced-rcu-lock > +flag ~empty Rcu-unlock \ range(rcu-rscs) as unbalanced-rcu-unlock This renaming makes sense to me. > (* Compute matching pairs of nested Srcu-lock and Srcu-unlock *) > -let srcu-rscs = let rec > - unmatched-locks = Srcu-lock \ domain(matched) > - and unmatched-unlocks = Srcu-unlock \ range(matched) > - and unmatched = unmatched-locks | unmatched-unlocks > - and unmatched-po = ([unmatched] ; po ; [unmatched]) & loc > - and unmatched-locks-to-unlocks = > - ([unmatched-locks] ; po ; [unmatched-unlocks]) & loc > - and matched = matched | (unmatched-locks-to-unlocks \ > - (unmatched-po ; unmatched-po)) > - in matched > +let srcu-rscs = ([Srcu-lock] ; (data | rf)+ ; [Srcu-unlock]) & loc The point of the "+" instead of the "*" is to avoid LKMM being confused by an srcu_read_lock() immediately preceding an unrelated srcu_read_unlock(), right? Or am I missing something more subtle? > (* Validate nesting *) > -flag ~empty Srcu-lock \ domain(srcu-rscs) as unbalanced-srcu-locking > -flag ~empty Srcu-unlock \ range(srcu-rscs) as unbalanced-srcu-locking > +flag ~empty Srcu-lock \ domain(srcu-rscs) as unbalanced-srcu-lock > +flag ~empty Srcu-unlock \ range(srcu-rscs) as unbalanced-srcu-unlock > +flag ~empty (srcu-rscs^-1 ; srcu-rscs) \ id as multiple-srcu-matches > > (* Check for use of synchronize_srcu() inside an RCU critical section *) > flag ~empty rcu-rscs & (po ; [Sync-srcu] ; po) as invalid-sleep > > (* Validate SRCU dynamic match *) > -flag ~empty different-values(srcu-rscs) as srcu-bad-nesting > +flag ~empty different-values(srcu-rscs) as bad-srcu-value-match > > (* Compute marked and plain memory accesses *) > let Marked = (~M) | IW | Once | Release | Acquire | domain(rmw) | range(rmw) | > - LKR | LKW | UL | LF | RL | RU > + LKR | LKW | UL | LF | RL | RU | Srcu-lock | Srcu-unlock > let Plain = M \ Marked > > (* Redefine dependencies to include those carried through plain accesses *) > -let carry-dep = (data ; rfi)* > +let carry-dep = (data ; [~ Srcu-unlock] ; rfi)* The "[~ Srcu-unlock]" matches the store that bridges the data and rfi", correct? > let addr = carry-dep ; addr > let ctrl = carry-dep ; ctrl > let data = carry-dep ; data > Index: usb-devel/tools/memory-model/linux-kernel.def > =================================================================== > --- usb-devel.orig/tools/memory-model/linux-kernel.def > +++ usb-devel/tools/memory-model/linux-kernel.def > @@ -49,8 +49,10 @@ synchronize_rcu() { __fence{sync-rcu}; } > synchronize_rcu_expedited() { __fence{sync-rcu}; } > > // SRCU > -srcu_read_lock(X) __srcu{srcu-lock}(X) > -srcu_read_unlock(X,Y) { __srcu{srcu-unlock}(X,Y); } > +srcu_read_lock(X) __load{srcu-lock}(*X) > +srcu_read_unlock(X,Y) { __store{srcu-unlock}(*X,Y); } > +srcu_down_read(X) __load{srcu-lock}(*X) > +srcu_up_read(X,Y) { __store{srcu-unlock}(*X,Y); } And here srcu_down_read() and srcu_up_read() are synonyms for srcu_read_lock() and srcu_read_unlock(), respectively, which I believe should suffice. > synchronize_srcu(X) { __srcu{sync-srcu}(X); } > synchronize_srcu_expedited(X) { __srcu{sync-srcu}(X); } So this looks quite reasonable to me. Thanx, Paul