[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y8rff3HJ2o9wUyGT@rowland.harvard.edu>
Date: Fri, 20 Jan 2023 13:37:51 -0500
From: Alan Stern <stern@...land.harvard.edu>
To: "Paul E. McKenney" <paulmck@...nel.org>
Cc: Andrea Parri <parri.andrea@...il.com>,
Jonas Oberhauser <jonas.oberhauser@...wei.com>,
Peter Zijlstra <peterz@...radead.org>, will <will@...nel.org>,
"boqun.feng" <boqun.feng@...il.com>, npiggin <npiggin@...il.com>,
dhowells <dhowells@...hat.com>,
"j.alglave" <j.alglave@....ac.uk>,
"luc.maranget" <luc.maranget@...ia.fr>, akiyks <akiyks@...il.com>,
dlustig <dlustig@...dia.com>, joel <joel@...lfernandes.org>,
urezki <urezki@...il.com>,
quic_neeraju <quic_neeraju@...cinc.com>,
frederic <frederic@...nel.org>,
Kernel development list <linux-kernel@...r.kernel.org>
Subject: Re: Internal vs. external barriers (was: Re: Interesting LKMM litmus
test)
On Fri, Jan 20, 2023 at 09:58:04AM -0800, Paul E. McKenney wrote:
> On Fri, Jan 20, 2023 at 11:01:03AM -0500, Alan Stern wrote:
> > On Wed, Jan 18, 2023 at 04:02:14PM -0800, Paul E. McKenney wrote:
> > > There are pairs of per-CPU counters. One pair (->srcu_lock_count[])
> > > counts the number of srcu_down_read() operations that took place on
> > > that CPU and another pair (->srcu_unlock_count[]) counts the number
> > > of srcu_down_read() operations that took place on that CPU. There is
> > > an ->srcu_idx that selects which of the ->srcu_lock_count[] elements
> > > should be incremented by srcu_down_read(). Of course, srcu_down_read()
> > > returns the value of ->srcu_idx that it used so that the matching
> > > srcu_up_read() will use that same index when incrementing its CPU's
> > > ->srcu_unlock_count[].
> > >
> > > Grace periods go something like this:
> > >
> > > 1. Sum up the ->srcu_unlock_count[!ssp->srcu_idx] counters.
> > >
> > > 2. smp_mb().
> > >
> > > 3. Sum up the ->srcu_unlock_count[!ssp->srcu_idx] counters.
> >
> > Presumably you meant to write "lock" here, not "unlock".
>
> You are quite right, and apologies for my confusion.
>
> > > 4. If the sums are not equal, retry from #1.
> > >
> > > 5. smp_mb().
> > >
> > > 6. WRITE_ONCE(ssp->srcu_idx, !ssp->srcu_idx);
> > >
> > > 7. smp_mb().
> > >
> > > 8. Same loop as #1-4.
> > >
> > > So similar to r/w semaphores, but with two separate distributed counts.
> > > This means that the number of readers need not go to zero at any given
> > > point in time, consistent with the need to wait only on old readers.
> >
> > Reasoning from first principles, I deduce the following:
> >
> > You didn't describe exactly how srcu_down_read() and srcu_up_read()
> > work. Evidently the unlock increment in srcu_up_read() should have
> > release semantics, to prevent accesses from escaping out the end of the
> > critical section. But the lock increment in srcu_down_read() has to be
> > stronger than an acquire; to prevent accesses in the critical section
> > escaping out the start, the increment has to be followed by smp_mb().
>
> You got it! There is some work going on to see if srcu_read_lock()'s
> smp_mb() can be weakened to pure release, but we will see.
That doesn't make sense. Release ordering in srcu_read_lock() would
only prevent accesses from leaking _in_ to the critical section. It
would do nothing to prevent accesses from leaking _out_.
> > The smp_mb() fences in steps 5 and 7 appear to be completely
> > unnecessary.
>
> For correctness, agreed. Their purpose is instead forward progress.
It's hard to say whether they would be effective at that. smp_mb()
forces the processor to wait until some time when previous writes have
become visible to all CPUs. But if you don't wait for that potentially
excessively long delay, you may be able to continue and be lucky enough
to find that all previous writes have already become visible to all the
CPUs that matter.
As far as I know, smp_mb() doesn't expedite the process of making
previous writes visible. However, I am very far from being an expert
on system architecture design.
> One can argue that step 5 is redundant due to control dependency, but
> control dependencies are fragile, and as you say below, this code is
> nowhere near a fastpath.
Also, control dependencies do not contribute to forward progress.
> > Provided an smp_mb() is added at the very start and end of the grace
> > period, the memory barrier in step 2 and its copy in step 8 can be
> > demoted to smp_rmb().
>
> This might need to be smp_mb() to allow srcu_read_unlock() to be
> demoted to release ordering. Work in progress.
I thought srcu_read_unlock() already _is_ a release operation. The
smp_mb() fence mentioned earlier needs to be in srcu_read_lock(), not
unlock(). And there's no way that one can be demoted.
srcu_read_unlock() does not need a full smp_mb().
> > These changes would be small optimizations at best, and you may consider
> > them unimportant in view of the fact that grace periods often last quite
> > a long time.
>
> Agreed, keeping it simple and obvious is important on this code, which
> is nowhere near a fastpath. The case of srcu_read_unlock() is another
> thing altogether.
Unfortunately, the full fence in srcu_read_lock() is unavoidable without
very major changes to the algorithm -- probably a complete redesign.
Without it, a read inside the critical section could be executed before
the store part of the increment, which could lead synchronize_srcu() to
believe that the critical section had not yet started when in fact it
had.
Alan
Powered by blists - more mailing lists