[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131121180237.GX4138@linux.vnet.ibm.com>
Date: Thu, 21 Nov 2013 10:02:37 -0800
From: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
To: Peter Zijlstra <peterz@...radead.org>
Cc: linux-kernel@...r.kernel.org, Will Deacon <will.deacon@....com>,
Tim Chen <tim.c.chen@...ux.intel.com>,
Ingo Molnar <mingo@...e.hu>,
Andrew Morton <akpm@...ux-foundation.org>,
Thomas Gleixner <tglx@...utronix.de>,
linux-arch@...r.kernel.org,
Linus Torvalds <torvalds@...ux-foundation.org>,
Waiman Long <waiman.long@...com>,
Andrea Arcangeli <aarcange@...hat.com>,
Alex Shi <alex.shi@...aro.org>,
Andi Kleen <andi@...stfloor.org>,
Michel Lespinasse <walken@...gle.com>,
Davidlohr Bueso <davidlohr.bueso@...com>,
Matthew R Wilcox <matthew.r.wilcox@...el.com>,
Dave Hansen <dave.hansen@...el.com>,
Rik van Riel <riel@...hat.com>,
Peter Hurley <peter@...leysoftware.com>,
Raghavendra K T <raghavendra.kt@...ux.vnet.ibm.com>,
George Spelvin <linux@...izon.com>,
"H. Peter Anvin" <hpa@...or.com>, Arnd Bergmann <arnd@...db.de>,
Aswin Chandramouleeswaran <aswin@...com>,
Scott J Norton <scott.norton@...com>,
"Figo.zhang" <figo1802@...il.com>
Subject: Re: [RFC] Control dependencies
On Thu, Nov 21, 2013 at 05:17:33PM +0100, Peter Zijlstra wrote:
> Hey Paul,
>
> So on IRC you said you were going to post a patch to clarify/allow
> control dependencies -- seeing you didn't get around to it, I thought
> I'd take a stab at it.
I do have a prototype queued, but let's see what you have. Sending mine
in parallel anyway, just in case we have a shortage of confusion. ;-)
I will combine them and keep your Signed-off-by if you are OK with that.
> The below is a patch to the perf code that uses one to get rid of a
> pesky full memory barrier. Along with a patch to _the_ Document to
> hopefully clarify the issue some. Although I feel there is far more to
> say on this subject than I have attempted.
>
> Since it now looks like smp_store_release() needs a full memory barrier
> that approach isn't actually looking all that attractive for me anymore
> (I'll not give up on those patches just yet), but I did want to put this
> approach forward.
I am not so sure that smp_store_release() needs a full memory barrier, but
please take a look at Message-ID <20131121172558.GA27927@...ux.vnet.ibm.com>,
sent quite recently.
Please see comments interspersed, thoughts?
Thanx, Paul
> ---
> --- a/Documentation/memory-barriers.txt
> +++ b/Documentation/memory-barriers.txt
> @@ -526,21 +526,27 @@ See also the subsection on "Cache Cohere
> CONTROL DEPENDENCIES
> --------------------
>
> -A control dependency requires a full read memory barrier, not simply a data
> -dependency barrier to make it work correctly. Consider the following bit of
> -code:
> +Because CPUs do not allow store speculation -- this would result in values out
> +of thin air -- store visibility depends on a linear branch history. Therefore
> +we can rely on LOAD -> STORE control dependencies to order things.
>
> - q = &a;
> - if (p) {
> - <data dependency barrier>
> - q = &b;
> + if (x) {
> + y = 1;
> + }
> +
> +The store to y must happen after the read to x. However C11/C++11 does not
> +(yet) prohibit STORE speculation, and therefore we should insert a compiler
> +barrier to force our compiler to do as it is told, and the above example
> +should read:
> +
> + if (x) {
> + barrier();
> + y = 1;
> }
> - x = *q;
In my draft, I rely on ACCESS_ONCE() rather than barrier(), but clearly
we need to call out both. Both yours and mine need to be more emphatic
about the "if" being needed.
There is an odd example in mine where both branches of an "if" statement
do identical writes. This seems vulnerable to compiler "optimizations"
that hoist the stores out of the "if" statement, defeating ordering.
I had not yet figured out what to say about that, hence my tardiness
in sending. (Plus inertia, of course!)
> -This will not have the desired effect because there is no actual data
> -dependency, but rather a control dependency that the CPU may short-circuit by
> -attempting to predict the outcome in advance. In such a case what's actually
> -required is:
> +On the other hand, CPUs (and compilers) are allowed to aggressively speculate
> +on loads, therefore we cannot rely on LOAD -> LOAD control dependencies such
> +as:
Your example is better than mine here, because mine fails to make it
painfully clear that control dependencies don't apply to subsequent loads.
I will pull this point in.
> q = &a;
> if (p) {
> @@ -549,6 +555,8 @@ attempting to predict the outcome in adv
> }
> x = *q;
>
> +And the read barrier as per the above example is indeed required to ensure
> +order.
>
> SMP BARRIER PAIRING
> -------------------
> --- a/kernel/events/ring_buffer.c
> +++ b/kernel/events/ring_buffer.c
My patch does not cover this file. Wouldn't hurt for them to be
separate.
> @@ -62,18 +62,18 @@ static void perf_output_put_handle(struc
> * kernel user
> *
> * READ ->data_tail READ ->data_head
> - * smp_mb() (A) smp_rmb() (C)
> + * barrier() (A) smp_rmb() (C)
We need a conditional for this to work. I know that the required
conditional is there in the code, but we need it explicitly in this
example as well.
> * WRITE $data READ $data
> * smp_wmb() (B) smp_mb() (D)
> * STORE ->data_head WRITE ->data_tail
> *
> * Where A pairs with D, and B pairs with C.
> *
> - * I don't think A needs to be a full barrier because we won't in fact
> - * write data until we see the store from userspace. So we simply don't
> - * issue the data WRITE until we observe it. Be conservative for now.
> + * In our case (A) is a control barrier that separates the loading of
> + * the ->data_tail and the writing of $data.
Actually, we need both a conditional and something to prevent the
compiler from hoisting code to precede that conditional. The barrier()
prevents the hoisting, but we need to explicitly call out the conditional.
Otherwise, someone will read this and assume that any load followed by
barrier() will always be ordered against subsequent stores.
We should call this a "control dependency" rather than a "control
barrier" to emphasize that the conditional is part and parcel of the
ordering guarantee.
> + * In case ->data_tail
> + * indicates there is no room in the buffer to store $data we bail.
> *
> - * OTOH, D needs to be a full barrier since it separates the data READ
> + * D needs to be a full barrier since it separates the data READ
> * from the tail WRITE.
> *
> * For B a WMB is sufficient since it separates two WRITEs, and for C
> @@ -148,13 +148,15 @@ int perf_output_begin(struct perf_output
> } while (local_cmpxchg(&rb->head, offset, head) != offset);
>
> /*
> - * Separate the userpage->tail read from the data stores below.
> + * Control barrier separating the @tail read above from the
> + * data writes below.
Or maybe "control dependency barrier".
> + *
> * Matches the MB userspace SHOULD issue after reading the data
> * and before storing the new tail position.
> *
> * See perf_output_put_handle().
> */
> - smp_mb();
> + barrier();
>
> if (unlikely(head - local_read(&rb->wakeup) > rb->watermark))
> local_add(rb->watermark, &rb->wakeup);
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists