lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131121192818.GA18689@linux.vnet.ibm.com>
Date:	Thu, 21 Nov 2013 11:28:18 -0800
From:	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
To:	Peter Zijlstra <peterz@...radead.org>
Cc:	linux-kernel@...r.kernel.org, Will Deacon <will.deacon@....com>,
	Tim Chen <tim.c.chen@...ux.intel.com>,
	Ingo Molnar <mingo@...e.hu>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	linux-arch@...r.kernel.org,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Waiman Long <waiman.long@...com>,
	Andrea Arcangeli <aarcange@...hat.com>,
	Alex Shi <alex.shi@...aro.org>,
	Andi Kleen <andi@...stfloor.org>,
	Michel Lespinasse <walken@...gle.com>,
	Davidlohr Bueso <davidlohr.bueso@...com>,
	Matthew R Wilcox <matthew.r.wilcox@...el.com>,
	Dave Hansen <dave.hansen@...el.com>,
	Rik van Riel <riel@...hat.com>,
	Peter Hurley <peter@...leysoftware.com>,
	Raghavendra K T <raghavendra.kt@...ux.vnet.ibm.com>,
	George Spelvin <linux@...izon.com>,
	"H. Peter Anvin" <hpa@...or.com>, Arnd Bergmann <arnd@...db.de>,
	Aswin Chandramouleeswaran <aswin@...com>,
	Scott J Norton <scott.norton@...com>,
	"Figo.zhang" <figo1802@...il.com>
Subject: Re: [RFC] Control dependencies

On Thu, Nov 21, 2013 at 10:02:37AM -0800, Paul E. McKenney wrote:
> On Thu, Nov 21, 2013 at 05:17:33PM +0100, Peter Zijlstra wrote:
> > Hey Paul,
> > 
> > So on IRC you said you were going to post a patch to clarify/allow
> > control dependencies -- seeing you didn't get around to it, I thought
> > I'd take a stab at it.
> 
> I do have a prototype queued, but let's see what you have.  Sending mine
> in parallel anyway, just in case we have a shortage of confusion.  ;-)
> 
> I will combine them and keep your Signed-off-by if you are OK with that.

Oh, right, and there was this other complication...  Suppose that we
have something like the following:

	q = ACCESS_ONCE(a);
	if (c)
		ACCESS_ONCE(b) = q;

Suppose that the compiler figures out that c!=0 always.  Then the
compiler is free to optimize as follows:

	q = ACCESS_ONCE(a);
	ACCESS_ONCE(b) = q;

Goodbye to the control dependency and associated ordering guarantees!

One way to deal with this is to restrict the condition to something that
the compiler is not permitted to predict, for example:

	q = ACCESS_ONCE(a);
	if (ACCESS_ONCE(c))
		ACCESS_ONCE(b) = q;

Of course, you should not even -think- about having a conditional that
is a constant!  ;-)

Other thoughts?

							Thanx, Paul

> > The below is a patch to the perf code that uses one to get rid of a
> > pesky full memory barrier. Along with a patch to _the_ Document to
> > hopefully clarify the issue some. Although I feel there is far more to
> > say on this subject than I have attempted.
> > 
> > Since it now looks like smp_store_release() needs a full memory barrier
> > that approach isn't actually looking all that attractive for me anymore
> > (I'll not give up on those patches just yet), but I did want to put this
> > approach forward.
> 
> I am not so sure that smp_store_release() needs a full memory barrier, but
> please take a look at Message-ID <20131121172558.GA27927@...ux.vnet.ibm.com>,
> sent quite recently.
> 
> Please see comments interspersed, thoughts?
> 
> 							Thanx, Paul
> 
> > ---
> > --- a/Documentation/memory-barriers.txt
> > +++ b/Documentation/memory-barriers.txt
> > @@ -526,21 +526,27 @@ See also the subsection on "Cache Cohere
> >  CONTROL DEPENDENCIES
> >  --------------------
> > 
> > -A control dependency requires a full read memory barrier, not simply a data
> > -dependency barrier to make it work correctly.  Consider the following bit of
> > -code:
> > +Because CPUs do not allow store speculation -- this would result in values out
> > +of thin air -- store visibility depends on a linear branch history. Therefore
> > +we can rely on LOAD -> STORE control dependencies to order things.
> > 
> > -	q = &a;
> > -	if (p) {
> > -		<data dependency barrier>
> > -		q = &b;
> > +	if (x) {
> > +		y = 1;
> > +	}
> > +
> > +The store to y must happen after the read to x. However C11/C++11 does not
> > +(yet) prohibit STORE speculation, and therefore we should insert a compiler
> > +barrier to force our compiler to do as it is told, and the above example
> > +should read:
> > +
> > +	if (x) {
> > +		barrier();
> > +		y = 1;
> >  	}
> > -	x = *q;
> 
> In my draft, I rely on ACCESS_ONCE() rather than barrier(), but clearly
> we need to call out both.  Both yours and mine need to be more emphatic
> about the "if" being needed.
> 
> There is an odd example in mine where both branches of an "if" statement
> do identical writes.  This seems vulnerable to compiler "optimizations"
> that hoist the stores out of the "if" statement, defeating ordering.
> I had not yet figured out what to say about that, hence my tardiness
> in sending.  (Plus inertia, of course!)
> 
> > -This will not have the desired effect because there is no actual data
> > -dependency, but rather a control dependency that the CPU may short-circuit by
> > -attempting to predict the outcome in advance.  In such a case what's actually
> > -required is:
> > +On the other hand, CPUs (and compilers) are allowed to aggressively speculate
> > +on loads, therefore we cannot rely on LOAD -> LOAD control dependencies such
> > +as:
> 
> Your example is better than mine here, because mine fails to make it
> painfully clear that control dependencies don't apply to subsequent loads.
> I will pull this point in.
> 
> >  	q = &a;
> >  	if (p) {
> > @@ -549,6 +555,8 @@ attempting to predict the outcome in adv
> >  	}
> >  	x = *q;
> > 
> > +And the read barrier as per the above example is indeed required to ensure
> > +order.
> > 
> >  SMP BARRIER PAIRING
> >  -------------------
> > --- a/kernel/events/ring_buffer.c
> > +++ b/kernel/events/ring_buffer.c
> 
> My patch does not cover this file.  Wouldn't hurt for them to be
> separate.
> 
> > @@ -62,18 +62,18 @@ static void perf_output_put_handle(struc
> >  	 *   kernel				user
> >  	 *
> >  	 *   READ ->data_tail			READ ->data_head
> > -	 *   smp_mb()	(A)			smp_rmb()	(C)
> > +	 *   barrier()	(A)			smp_rmb()	(C)
> 
> We need a conditional for this to work.  I know that the required
> conditional is there in the code, but we need it explicitly in this
> example as well.
> 
> >  	 *   WRITE $data			READ $data
> >  	 *   smp_wmb()	(B)			smp_mb()	(D)
> >  	 *   STORE ->data_head			WRITE ->data_tail
> >  	 *
> >  	 * Where A pairs with D, and B pairs with C.
> >  	 *
> > -	 * I don't think A needs to be a full barrier because we won't in fact
> > -	 * write data until we see the store from userspace. So we simply don't
> > -	 * issue the data WRITE until we observe it. Be conservative for now.
> > +	 * In our case (A) is a control barrier that separates the loading of
> > +	 * the ->data_tail and the writing of $data.
> 
> Actually, we need both a conditional and something to prevent the
> compiler from hoisting code to precede that conditional.  The barrier()
> prevents the hoisting, but we need to explicitly call out the conditional.
> Otherwise, someone will read this and assume that any load followed by
> barrier() will always be ordered against subsequent stores.
> 
> We should call this a "control dependency" rather than a "control
> barrier" to emphasize that the conditional is part and parcel of the
> ordering guarantee.
> 
> > +	 *                                           In case ->data_tail
> > +	 * indicates there is no room in the buffer to store $data we bail.
> >  	 *
> > -	 * OTOH, D needs to be a full barrier since it separates the data READ
> > +	 * D needs to be a full barrier since it separates the data READ
> >  	 * from the tail WRITE.
> >  	 *
> >  	 * For B a WMB is sufficient since it separates two WRITEs, and for C
> > @@ -148,13 +148,15 @@ int perf_output_begin(struct perf_output
> >  	} while (local_cmpxchg(&rb->head, offset, head) != offset);
> > 
> >  	/*
> > -	 * Separate the userpage->tail read from the data stores below.
> > +	 * Control barrier separating the @tail read above from the
> > +	 * data writes below.
> 
> Or maybe "control dependency barrier".
> 
> > +	 *
> >  	 * Matches the MB userspace SHOULD issue after reading the data
> >  	 * and before storing the new tail position.
> >  	 *
> >  	 * See perf_output_put_handle().
> >  	 */
> > -	smp_mb();
> > +	barrier();
> > 
> >  	if (unlikely(head - local_read(&rb->wakeup) > rb->watermark))
> >  		local_add(rb->watermark, &rb->wakeup);
> > 

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ