Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752352AbaBWWcb (ORCPT ); Sun, 23 Feb 2014 17:32:31 -0500 Received: from mailout32.mail01.mtsvc.net ([216.70.64.70]:40073 "EHLO n23.mail01.mtsvc.net" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751740AbaBWWc3 (ORCPT ); Sun, 23 Feb 2014 17:32:29 -0500 Message-ID: <530A76F7.3010708@hurleysoftware.com> Date: Sun, 23 Feb 2014 17:32:23 -0500 From: Peter Hurley User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0 MIME-Version: 1.0 To: James Bottomley , "Paul E. McKenney" CC: Tejun Heo , Lai Jiangshan , linux-kernel@vger.kernel.org, Stefan Richter , linux1394-devel@lists.sourceforge.net, Chris Boot , linux-scsi@vger.kernel.org, target-devel@vger.kernel.org Subject: Re: [PATCH 4/9] firewire: don't use PREPARE_DELAYED_WORK References: <1392929071-16555-5-git-send-email-tj@kernel.org> <5306AF8E.3080006@hurleysoftware.com> <20140221015935.GF6897@htj.dyndns.org> <5306B4DF.4000901@hurleysoftware.com> <20140221021341.GG6897@htj.dyndns.org> <5306E06C.5020805@hurleysoftware.com> <20140221100301.GA14653@mtj.dyndns.org> <53074BE4.1020307@hurleysoftware.com> <20140221130614.GH6897@htj.dyndns.org> <5307849A.9050209@hurleysoftware.com> <20140221165730.GA10929@htj.dyndns.org> <5307DAC9.2020103@hurleysoftware.com> <1393094608.11497.1.camel@dabdike.int.hansenpartnership.com> <5308F0E2.3030804@hurleysoftware.com> <1393095138.11497.5.camel@dabdike.int.hansenpartnership.com> <5308F48C.8080609@hurleysoftware.com> <1393185948.9743.2.camel@dabdike> In-Reply-To: <1393185948.9743.2.camel@dabdike> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated-User: 990527 peter@hurleysoftware.com X-MT-ID: 8FA290C2A27252AACF65DBC4A42F3CE3735FB2A4 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, On 02/23/2014 03:05 PM, James Bottomley wrote: > On Sat, 2014-02-22 at 14:03 -0500, Peter Hurley wrote: >> If it is necessary for a RELEASE-ACQUIRE pair to produce a full barrier, the >> ACQUIRE can be followed by an smp_mb__after_unlock_lock() invocation. This >> will produce a full barrier if either (a) the RELEASE and the ACQUIRE are >> executed by the same CPU or task, or (b) the RELEASE and ACQUIRE act on the >> same variable. The smp_mb__after_unlock_lock() primitive is free on many >> architectures. Without smp_mb__after_unlock_lock(), the critical sections >> corresponding to the RELEASE and the ACQUIRE can cross: >> >> *A = a; >> RELEASE M >> ACQUIRE N >> *B = b; >> >> could occur as: >> >> ACQUIRE N, STORE *B, STORE *A, RELEASE M > > Ah, OK, that's an error in the documentation. AFAIK, Paul will not be changing the quoted text above. > The example should read > > *A = a; > RELEASE *N* > ACQUIRE *M* > *B = b; > > The point being you can't have speculation that entangles critical > sections, as I've been saying, because that would speculate you into > ABBA deadlocks. Paul McKenny will submit a patch fixing the bug in > documentation. The reason why there is no deadlock here is because the RELEASE M is not dependent on the ACQUIRE N to complete. If the attempt to ACQUIRE N is speculated before the RELEASE M, two possibilities exist: 1. N is not owned, so the ACQUIRE is immediately successful, or 2. N is owned, so the attempted ACQUIRE is not immediately successful. However, in both cases the RELEASE M will still complete, having already been started (since it occurred before in the instruction stream). Regards, Peter Hurley -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/