Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp6334766ybp; Tue, 15 Oct 2019 13:19:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqxeu9V9iDORaWmnUCNeiWxWuFbLp+eR+qrDzLdkyPqyhEaV9ME0iTZNdK6ITBL/7+IYBtKT X-Received: by 2002:a50:ee12:: with SMTP id g18mr733990eds.114.1571170748255; Tue, 15 Oct 2019 13:19:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571170748; cv=none; d=google.com; s=arc-20160816; b=JoPl1EEpADBrBoRVOGUyZIKPjY9WU5OoGE7zaSHIVxM1RRERs4MXrac3J2WndwPdBM BwOkGO7ST001Sj8vn3HBsARjHScHWncu7wQnLe1WPSqzQEpT0X26r1WWzXeKB7N8zsVt z4Nluxqhn1jl+CmS7B1vS5W94A+yqJkSxFTeuoCpOBuhFN6v2rvyW2FJI3DKUOOU3gqd vysI8UXzI4HTes79QCa49KZighDfi6qKVaMUXh3sLV+im7q8eXm3ro6/3WwXEZvCWi3u yUl6Hw+c90iAUeu8hgvlwGzjv5QiFRtF57l7Z1Jg2aoZgOmzNo+cqX4Xqks93LvJOpI0 +XYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=lXme+RtjNQmxtByWs7TU/lzMTN7cVL8OFkxb/qBacZQ=; b=RRY3rhNMnUJ7rOz1+BheoM/kfoMNEfmmH7XNKOHjwnh9lWot86GEYsNnVK0K8NYoqS IxATH+NTZR3BiYCJq4zZftUtCOWOIv8ycMbs+tWLsQ97InXMc4SG+pFMStjxb3FYbnn5 robYQe24dbT48QLqe/BFw8CQ2RSwg/Ezg3fQX+9k0lg7cUEw729GZ/caKcgCNiNkmTCM Q/ly+P8d/z0YEE389vv+ZgJspKIlEkeEPxMmrMrf2xSBYy95rxRsdrBHXTlHmy+Yup/3 1p+rasLAANk76S0/2QtslrToKv7Pcdg1ds+dtQcn0PENK/G+Wa6L0E0+S/lJbhexDvYF 6+hQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v27si13750307ejb.182.2019.10.15.13.18.44; Tue, 15 Oct 2019 13:19:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728847AbfJOQ1g (ORCPT + 99 others); Tue, 15 Oct 2019 12:27:36 -0400 Received: from mx2.suse.de ([195.135.220.15]:39752 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728554AbfJOQ1g (ORCPT ); Tue, 15 Oct 2019 12:27:36 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id BADC6B139; Tue, 15 Oct 2019 16:27:34 +0000 (UTC) Date: Tue, 15 Oct 2019 09:26:18 -0700 From: Davidlohr Bueso To: Peter Zijlstra Cc: Manfred Spraul , LKML , Waiman Long , 1vier1@web.de, Andrew Morton , Jonathan Corbet , parri.andrea@gmail.com Subject: Re: [PATCH 6/6] Documentation/memory-barriers.txt: Clarify cmpxchg() Message-ID: <20191015162618.prubsbu7xpou5n27@linux-p48b> References: <20191012054958.3624-1-manfred@colorfullife.com> <20191012054958.3624-7-manfred@colorfullife.com> <20191015012604.eonteqarhvgmrzuc@linux-p48b> <20191015071959.GA2311@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20191015071959.GA2311@hirez.programming.kicks-ass.net> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 15 Oct 2019, Peter Zijlstra wrote: >On Mon, Oct 14, 2019 at 06:26:04PM -0700, Davidlohr Bueso wrote: >> On Sat, 12 Oct 2019, Manfred Spraul wrote: >> > Invalid would be: >> > smp_mb__before_atomic(); >> > atomic_set(); >> >> fyi I've caught a couple of naughty users: >> >> drivers/crypto/cavium/nitrox/nitrox_main.c >> drivers/gpu/drm/msm/adreno/a5xx_preempt.c > >Yes, there's still some of that. Andrea went and killed a buch a while >ago I think. I sent these, which just does smp_mb(): https://lore.kernel.org/lkml/20191015161657.10760-1-dave@stgolabs.net https://lore.kernel.org/lkml/20191015162144.fuyc25tdwvc6ddu3@linux-p48b Similarly, I was doing some barrier auditing in btrfs code recently (completely unrelated to these topics) and noted that there are some cases where we can inverse this exercise. Iow, callers doing atomic Rmw along with smp_mb(), which we can replace with these upgradable calls and benefit, for example in x86. Thanks, Davidlohr