Provided by: manpages-dev_5.10-1ubuntu1_all bug

NAME

       membarrier - issue memory barriers on a set of threads

SYNOPSIS

       #include <linux/membarrier.h>

       int membarrier(int cmd, unsigned int flags, int cpu_id);

       Note: There is no glibc wrapper for this system call; see NOTES.

DESCRIPTION

       The  membarrier()  system call helps reducing the overhead of the memory barrier instructions required to
       order memory accesses on multi-core systems.  However, this system call is heavier than a memory barrier,
       so using it effectively is not as simple as replacing memory barriers with this system call, but requires
       understanding of the details below.

       Use of memory barriers needs to be done taking into account that a memory  barrier  always  needs  to  be
       either  matched  with  its  memory  barrier counterparts, or that the architecture's memory model doesn't
       require the matching barriers.

       There are cases where one side of the matching barriers (which we  will  refer  to  as  "fast  side")  is
       executed  much more often than the other (which we will refer to as "slow side").  This is a prime target
       for the use of membarrier().  The key idea is to replace, for  these  matching  barriers,  the  fast-side
       memory barriers by simple compiler barriers, for example:

           asm volatile ("" : : : "memory")

       and replace the slow-side memory barriers by calls to membarrier().

       This  will  add  overhead  to the slow side, and remove overhead from the fast side, thus resulting in an
       overall performance increase as long as the slow side is infrequent  enough  that  the  overhead  of  the
       membarrier() calls does not outweigh the performance gain on the fast side.

       The cmd argument is one of the following:

       MEMBARRIER_CMD_QUERY (since Linux 4.3)
              Query  the  set  of  supported  commands.  The return value of the call is a bit mask of supported
              commands.  MEMBARRIER_CMD_QUERY, which has the value 0, is not itself included in this  bit  mask.
              This command is always supported (on kernels where membarrier() is provided).

       MEMBARRIER_CMD_GLOBAL (since Linux 4.16)
              Ensure  that  all  threads  from all processes on the system pass through a state where all memory
              accesses to user-space addresses match  program  order  between  entry  to  and  return  from  the
              membarrier() system call.  All threads on the system are targeted by this command.

       MEMBARRIER_CMD_GLOBAL_EXPEDITED (since Linux 4.16)
              Execute  a  memory barrier on all running threads of all processes that previously registered with
              MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED.

              Upon return from the system call, the calling thread has a guarantee that all running threads have
              passed  through  a  state  where  all  memory accesses to user-space addresses match program order
              between entry to and return from the system call (non-running threads  are  de  facto  in  such  a
              state).   This  guarantee is provided only for the threads of processes that previously registered
              with MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED.

              Given that registration is about the intent to  receive  the  barriers,  it  is  valid  to  invoke
              MEMBARRIER_CMD_GLOBAL_EXPEDITED      from      a     process     that     has     not     employed
              MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED.

              The "expedited" commands complete faster than the non-expedited ones; they never block,  but  have
              the downside of causing extra overhead.

       MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED (since Linux 4.16)
              Register the process's intent to receive MEMBARRIER_CMD_GLOBAL_EXPEDITED memory barriers.

       MEMBARRIER_CMD_PRIVATE_EXPEDITED (since Linux 4.14)
              Execute  a  memory  barrier  on  each  running thread belonging to the same process as the calling
              thread.

              Upon return from the system call, the calling thread has a guarantee that all its  running  thread
              siblings  have  passed  through  a  state  where all memory accesses to user-space addresses match
              program order between entry to and return from the system call (non-running threads are  de  facto
              in  such a state).  This guarantee is provided only for threads in the same process as the calling
              thread.

              The "expedited" commands complete faster than the non-expedited ones; they never block,  but  have
              the downside of causing extra overhead.

              A process must register its intent to use the private expedited command prior to using it.

       MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED (since Linux 4.14)
              Register the process's intent to use MEMBARRIER_CMD_PRIVATE_EXPEDITED.

       MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE (since Linux 4.16)
              In     addition     to     providing    the    memory    ordering    guarantees    described    in
              MEMBARRIER_CMD_PRIVATE_EXPEDITED, upon return from system call the calling thread has a  guarantee
              that all its running thread siblings have executed a core serializing instruction.  This guarantee
              is provided only for threads in the same process as the calling thread.

              The "expedited" commands complete faster than the non-expedited ones, they never block,  but  have
              the downside of causing extra overhead.

              A  process  must register its intent to use the private expedited sync core command prior to using
              it.

       MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE (since Linux 4.16)
              Register the process's intent to use MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE.

       MEMBARRIER_CMD_PRIVATE_EXPEDITED_RSEQ (since Linux 5.10)
              Ensure the caller thread, upon return from system call, that all its running thread siblings  have
              any currently running rseq critical sections restarted if flags parameter is 0; if flags parameter
              is MEMBARRIER_CMD_FLAG_CPU, then this operation is performed only  on  CPU  indicated  by  cpu_id.
              This guarantee is provided only for threads in the same process as the calling thread.

              RSEQ membarrier is only available in the "private expedited" form.

              A process must register its intent to use the private expedited rseq command prior to using it.

       MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_RSEQ (since Linux 5.10)
              Register the process's intent to use MEMBARRIER_CMD_PRIVATE_EXPEDITED_RSEQ.

       MEMBARRIER_CMD_SHARED (since Linux 4.3)
              This is an alias for MEMBARRIER_CMD_GLOBAL that exists for header backward compatibility.

       The flags argument must be specified as 0 unless the command is MEMBARRIER_CMD_PRIVATE_EXPEDITED_RSEQ, in
       which case flags can be either 0 or MEMBARRIER_CMD_FLAG_CPU.

       The cpu_id argument is ignored unless flags is MEMBARRIER_CMD_FLAG_CPU, in which case it must specify the
       CPU targeted by this membarrier command.

       All  memory  accesses  performed  in program order from each targeted thread are guaranteed to be ordered
       with respect to membarrier().

       If we use the semantic barrier() to represent a compiler barrier forcing memory accesses to be  performed
       in  program  order  across  the  barrier, and smp_mb() to represent explicit memory barriers forcing full
       memory ordering across the barrier, we have the following ordering table for each pairing  of  barrier(),
       membarrier(), and smp_mb().  The pair ordering is detailed as (O: ordered, X: not ordered):

                              barrier()  smp_mb()  membarrier()
              barrier()          X          X          O
              smp_mb()           X          O          O
              membarrier()       O          O          O

RETURN VALUE

       On  success,  the  MEMBARRIER_CMD_QUERY  operation  returns  a  bit  mask  of supported commands, and the
       MEMBARRIER_CMD_GLOBAL,     MEMBARRIER_CMD_GLOBAL_EXPEDITED,     MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED,
       MEMBARRIER_CMD_PRIVATE_EXPEDITED,                              MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED,
       MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE,    and    MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE
       operations return zero.  On error, -1 is returned, and errno is set appropriately.

       For  a given command, with flags set to 0, this system call is guaranteed to always return the same value
       until reboot.  Further calls with the same arguments will lead to the same result.  Therefore, with flags
       set to 0, error handling is required only for the first call to membarrier().

ERRORS

       EINVAL cmd  is invalid, or flags is nonzero, or the MEMBARRIER_CMD_GLOBAL command is disabled because the
              nohz_full CPU parameter  has  been  set,  or  the  MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE  and
              MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE   commands   are   not   implemented   by  the
              architecture.

       ENOSYS The membarrier() system call is not implemented by this kernel.

       EPERM  The current process was not registered prior to using private expedited commands.

VERSIONS

       The membarrier() system call was added in Linux 4.3.

       Before Linux 5.10, the prototype for membarrier() was:

           int membarrier(int cmd, int flags);

CONFORMING TO

       membarrier() is Linux-specific.

NOTES

       A memory barrier instruction is part of the instruction set of architectures with weakly  ordered  memory
       models.   It  orders  memory accesses prior to the barrier and after the barrier with respect to matching
       barriers on other cores.  For instance, a load fence can order loads prior to and  following  that  fence
       with respect to stores ordered by store fences.

       Program order is the order in which instructions are ordered in the program assembly code.

       Examples  where  membarrier()  can  be  useful  include implementations of Read-Copy-Update libraries and
       garbage collectors.

       Glibc does not provide a wrapper for this system call; call it using syscall(2).

EXAMPLES

       Assuming a  multithreaded  application  where  "fast_path()"  is  executed  very  frequently,  and  where
       "slow_path()" is executed infrequently, the following code (x86) can be transformed using membarrier():

           #include <stdlib.h>

           static volatile int a, b;

           static void
           fast_path(int *read_b)
           {
               a = 1;
               asm volatile ("mfence" : : : "memory");
               *read_b = b;
           }

           static void
           slow_path(int *read_a)
           {
               b = 1;
               asm volatile ("mfence" : : : "memory");
               *read_a = a;
           }

           int
           main(int argc, char **argv)
           {
               int read_a, read_b;

               /*
                * Real applications would call fast_path() and slow_path()
                * from different threads. Call those from main() to keep
                * this example short.
                */

               slow_path(&read_a);
               fast_path(&read_b);

               /*
                * read_b == 0 implies read_a == 1 and
                * read_a == 0 implies read_b == 1.
                */

               if (read_b == 0 && read_a == 0)
                   abort();

               exit(EXIT_SUCCESS);
           }

       The code above transformed to use membarrier() becomes:

           #define _GNU_SOURCE
           #include <stdlib.h>
           #include <stdio.h>
           #include <unistd.h>
           #include <sys/syscall.h>
           #include <linux/membarrier.h>

           static volatile int a, b;

           static int
           membarrier(int cmd, unsigned int flags, int cpu_id)
           {
               return syscall(__NR_membarrier, cmd, flags, cpu_id);
           }

           static int
           init_membarrier(void)
           {
               int ret;

               /* Check that membarrier() is supported. */

               ret = membarrier(MEMBARRIER_CMD_QUERY, 0, 0);
               if (ret < 0) {
                   perror("membarrier");
                   return -1;
               }

               if (!(ret & MEMBARRIER_CMD_GLOBAL)) {
                   fprintf(stderr,
                       "membarrier does not support MEMBARRIER_CMD_GLOBAL\n");
                   return -1;
               }

               return 0;
           }

           static void
           fast_path(int *read_b)
           {
               a = 1;
               asm volatile ("" : : : "memory");
               *read_b = b;
           }

           static void
           slow_path(int *read_a)
           {
               b = 1;
               membarrier(MEMBARRIER_CMD_GLOBAL, 0, 0);
               *read_a = a;
           }

           int
           main(int argc, char **argv)
           {
               int read_a, read_b;

               if (init_membarrier())
                   exit(EXIT_FAILURE);

               /*
                * Real applications would call fast_path() and slow_path()
                * from different threads. Call those from main() to keep
                * this example short.
                */

               slow_path(&read_a);
               fast_path(&read_b);

               /*
                * read_b == 0 implies read_a == 1 and
                * read_a == 0 implies read_b == 1.
                */

               if (read_b == 0 && read_a == 0)
                   abort();

               exit(EXIT_SUCCESS);
           }

COLOPHON

       This  page  is  part  of  release  5.10  of  the  Linux man-pages project.  A description of the project,
       information  about  reporting  bugs,  and  the  latest  version  of  this   page,   can   be   found   at
       https://www.kernel.org/doc/man-pages/.