Re: [PATCH v3] tools/memory-model/Documentation: Fix "conflict" definition

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 02, 2020 at 06:21:01PM +0100, Marco Elver wrote:
> The definition of "conflict" should not include the type of access nor
> whether the accesses are concurrent or not, which this patch addresses.
> The definition of "data race" remains unchanged.
> 
> The definition of "conflict" as we know it and is cited by various
> papers on memory consistency models appeared in [1]: "Two accesses to
> the same variable conflict if at least one is a write; two operations
> conflict if they execute conflicting accesses."
> 
> The LKMM as well as the C11 memory model are adaptations of
> data-race-free, which are based on the work in [2]. Necessarily, we need
> both conflicting data operations (plain) and synchronization operations
> (marked). For example, C11's definition is based on [3], which defines a
> "data race" as: "Two memory operations conflict if they access the same
> memory location, and at least one of them is a store, atomic store, or
> atomic read-modify-write operation. In a sequentially consistent
> execution, two memory operations from different threads form a type 1
> data race if they conflict, at least one of them is a data operation,
> and they are adjacent in <T (i.e., they may be executed concurrently)."
> 
> [1] D. Shasha, M. Snir, "Efficient and Correct Execution of Parallel
>     Programs that Share Memory", 1988.
> 	URL: http://snir.cs.illinois.edu/listed/J21.pdf
> 
> [2] S. Adve, "Designing Memory Consistency Models for Shared-Memory
>     Multiprocessors", 1993.
> 	URL: http://sadve.cs.illinois.edu/Publications/thesis.pdf
> 
> [3] H.-J. Boehm, S. Adve, "Foundations of the C++ Concurrency Memory
>     Model", 2008.
> 	URL: https://www.hpl.hp.com/techreports/2008/HPL-2008-56.pdf
> 
> Signed-off-by: Marco Elver <elver@xxxxxxxxxx>
> Co-developed-by: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
> Signed-off-by: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>

LGTM:

Acked-by: Andrea Parri <parri.andrea@xxxxxxxxx>

Thank you both,

  Andrea


> ---
> v3:
> * Apply Alan's suggestion.
> * s/two race candidates/race candidates/
> 
> v2: http://lkml.kernel.org/r/20200302141819.40270-1-elver@xxxxxxxxxx
> * Apply Alan's suggested version.
>   - Move "from different CPUs (or threads)" from "conflict" to "data
>     race" definition. Update "race candidate" accordingly.
> * Add citations to commit message.
> 
> v1: http://lkml.kernel.org/r/20200228164621.87523-1-elver@xxxxxxxxxx
> ---
>  .../Documentation/explanation.txt             | 83 ++++++++++---------
>  1 file changed, 45 insertions(+), 38 deletions(-)
> 
> diff --git a/tools/memory-model/Documentation/explanation.txt b/tools/memory-model/Documentation/explanation.txt
> index e91a2eb19592a..993f800659c6a 100644
> --- a/tools/memory-model/Documentation/explanation.txt
> +++ b/tools/memory-model/Documentation/explanation.txt
> @@ -1987,28 +1987,36 @@ outcome undefined.
>  
>  In technical terms, the compiler is allowed to assume that when the
>  program executes, there will not be any data races.  A "data race"
> -occurs when two conflicting memory accesses execute concurrently;
> -two memory accesses "conflict" if:
> +occurs when there are two memory accesses such that:
>  
> -	they access the same location,
> +1.	they access the same location,
>  
> -	they occur on different CPUs (or in different threads on the
> -	same CPU),
> +2.	at least one of them is a store,
>  
> -	at least one of them is a plain access,
> +3.	at least one of them is plain,
>  
> -	and at least one of them is a store.
> +4.	they occur on different CPUs (or in different threads on the
> +	same CPU), and
>  
> -The LKMM tries to determine whether a program contains two conflicting
> -accesses which may execute concurrently; if it does then the LKMM says
> -there is a potential data race and makes no predictions about the
> -program's outcome.
> +5.	they execute concurrently.
>  
> -Determining whether two accesses conflict is easy; you can see that
> -all the concepts involved in the definition above are already part of
> -the memory model.  The hard part is telling whether they may execute
> -concurrently.  The LKMM takes a conservative attitude, assuming that
> -accesses may be concurrent unless it can prove they cannot.
> +In the literature, two accesses are said to "conflict" if they satisfy
> +1 and 2 above.  We'll go a little farther and say that two accesses
> +are "race candidates" if they satisfy 1 - 4.  Thus, whether or not two
> +race candidates actually do race in a given execution depends on
> +whether they are concurrent.
> +
> +The LKMM tries to determine whether a program contains race candidates
> +which may execute concurrently; if it does then the LKMM says there is
> +a potential data race and makes no predictions about the program's
> +outcome.
> +
> +Determining whether two accesses are race candidates is easy; you can
> +see that all the concepts involved in the definition above are already
> +part of the memory model.  The hard part is telling whether they may
> +execute concurrently.  The LKMM takes a conservative attitude,
> +assuming that accesses may be concurrent unless it can prove they
> +are not.
>  
>  If two memory accesses aren't concurrent then one must execute before
>  the other.  Therefore the LKMM decides two accesses aren't concurrent
> @@ -2171,8 +2179,8 @@ again, now using plain accesses for buf:
>  	}
>  
>  This program does not contain a data race.  Although the U and V
> -accesses conflict, the LKMM can prove they are not concurrent as
> -follows:
> +accesses are race candidates, the LKMM can prove they are not
> +concurrent as follows:
>  
>  	The smp_wmb() fence in P0 is both a compiler barrier and a
>  	cumul-fence.  It guarantees that no matter what hash of
> @@ -2326,12 +2334,11 @@ could now perform the load of x before the load of ptr (there might be
>  a control dependency but no address dependency at the machine level).
>  
>  Finally, it turns out there is a situation in which a plain write does
> -not need to be w-post-bounded: when it is separated from the
> -conflicting access by a fence.  At first glance this may seem
> -impossible.  After all, to be conflicting the second access has to be
> -on a different CPU from the first, and fences don't link events on
> -different CPUs.  Well, normal fences don't -- but rcu-fence can!
> -Here's an example:
> +not need to be w-post-bounded: when it is separated from the other
> +race-candidate access by a fence.  At first glance this may seem
> +impossible.  After all, to be race candidates the two accesses must
> +be on different CPUs, and fences don't link events on different CPUs.
> +Well, normal fences don't -- but rcu-fence can!  Here's an example:
>  
>  	int x, y;
>  
> @@ -2367,7 +2374,7 @@ concurrent and there is no race, even though P1's plain store to y
>  isn't w-post-bounded by any marked accesses.
>  
>  Putting all this material together yields the following picture.  For
> -two conflicting stores W and W', where W ->co W', the LKMM says the
> +race-candidate stores W and W', where W ->co W', the LKMM says the
>  stores don't race if W can be linked to W' by a
>  
>  	w-post-bounded ; vis ; w-pre-bounded
> @@ -2380,8 +2387,8 @@ sequence, and if W' is plain then they also have to be linked by a
>  
>  	w-post-bounded ; vis ; r-pre-bounded
>  
> -sequence.  For a conflicting load R and store W, the LKMM says the two
> -accesses don't race if R can be linked to W by an
> +sequence.  For race-candidate load R and store W, the LKMM says the
> +two accesses don't race if R can be linked to W by an
>  
>  	r-post-bounded ; xb* ; w-pre-bounded
>  
> @@ -2413,20 +2420,20 @@ is, the rules governing the memory subsystem's choice of a store to
>  satisfy a load request and its determination of where a store will
>  fall in the coherence order):
>  
> -	If R and W conflict and it is possible to link R to W by one
> -	of the xb* sequences listed above, then W ->rfe R is not
> -	allowed (i.e., a load cannot read from a store that it
> +	If R and W are race candidates and it is possible to link R to
> +	W by one of the xb* sequences listed above, then W ->rfe R is
> +	not allowed (i.e., a load cannot read from a store that it
>  	executes before, even if one or both is plain).
>  
> -	If W and R conflict and it is possible to link W to R by one
> -	of the vis sequences listed above, then R ->fre W is not
> -	allowed (i.e., if a store is visible to a load then the load
> -	must read from that store or one coherence-after it).
> +	If W and R are race candidates and it is possible to link W to
> +	R by one of the vis sequences listed above, then R ->fre W is
> +	not allowed (i.e., if a store is visible to a load then the
> +	load must read from that store or one coherence-after it).
>  
> -	If W and W' conflict and it is possible to link W to W' by one
> -	of the vis sequences listed above, then W' ->co W is not
> -	allowed (i.e., if one store is visible to a second then the
> -	second must come after the first in the coherence order).
> +	If W and W' are race candidates and it is possible to link W
> +	to W' by one of the vis sequences listed above, then W' ->co W
> +	is not allowed (i.e., if one store is visible to a second then
> +	the second must come after the first in the coherence order).
>  
>  This is the extent to which the LKMM deals with plain accesses.
>  Perhaps it could say more (for example, plain accesses might
> -- 
> 2.25.0.265.gbab2e86ba0-goog
> 



[Index of Archives]     [Linux Kernel]     [Kernel Newbies]     [x86 Platform Driver]     [Netdev]     [Linux Wireless]     [Netfilter]     [Bugtraq]     [Linux Filesystems]     [Yosemite Discussion]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]

  Powered by Linux