Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965949AbdGTWdV convert rfc822-to-8bit (ORCPT ); Thu, 20 Jul 2017 18:33:21 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:37262 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965270AbdGTWdU (ORCPT ); Thu, 20 Jul 2017 18:33:20 -0400 Date: Thu, 20 Jul 2017 15:33:19 -0700 (PDT) Message-Id: <20170720.153319.615690739132189305.davem@davemloft.net> To: Haakon.Bugge@oracle.com Cc: santosh.shilimkar@oracle.com, netdev@vger.kernel.org, linux-rdma@vger.kernel.org, rds-devel@oss.oracle.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH net] rds: Make sure updates to cp_send_gen can be observed From: David Miller In-Reply-To: <20170720102855.21961-1-Haakon.Bugge@oracle.com> References: <20170720102855.21961-1-Haakon.Bugge@oracle.com> X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=iso-8859-1 Content-Transfer-Encoding: 8BIT X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Thu, 20 Jul 2017 15:33:19 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 736 Lines: 22 From: H?kon Bugge Date: Thu, 20 Jul 2017 12:28:55 +0200 > cp->cp_send_gen is treated as a normal variable, although it may be > used by different threads. > > This is fixed by using {READ,WRITE}_ONCE when it is incremented and > READ_ONCE when it is read outside the {acquire,release}_in_xmit > protection. > > Normative reference from the Linux-Kernel Memory Model: > > Loads from and stores to shared (but non-atomic) variables should > be protected with the READ_ONCE(), WRITE_ONCE(), and > ACCESS_ONCE(). > > Clause 5.1.2.4/25 in the C standard is also relevant. > > Signed-off-by: H?kon Bugge > Reviewed-by: Knut Omang Applied, thanks.