Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1762990AbXHITcR (ORCPT ); Thu, 9 Aug 2007 15:32:17 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1762244AbXHITbw (ORCPT ); Thu, 9 Aug 2007 15:31:52 -0400 Received: from mx1.redhat.com ([66.187.233.31]:45343 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751145AbXHITbu (ORCPT ); Thu, 9 Aug 2007 15:31:50 -0400 Message-ID: <46BB69F8.5000502@redhat.com> Date: Thu, 09 Aug 2007 15:24:40 -0400 From: Chris Snook User-Agent: Thunderbird 2.0.0.0 (X11/20070419) MIME-Version: 1.0 To: paulmck@linux.vnet.ibm.com CC: linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, torvalds@linux-foundation.org, netdev@vger.kernel.org, akpm@linux-foundation.org, ak@suse.de, heiko.carstens@de.ibm.com, davem@davemloft.net, schwidefsky@de.ibm.com, wensong@linux-vs.org, horms@verge.net.au, wjiang@resilience.com, cfriesen@nortel.com, zlynx@acm.org, rpjday@mindspring.com, jesper.juhl@gmail.com Subject: Re: [PATCH 1/24] make atomic_read() behave consistently on alpha References: <20070809143255.GA8424@linux.vnet.ibm.com> <46BB2A5A.5090006@redhat.com> <20070809150445.GB8424@linux.vnet.ibm.com> <46BB31A6.4080507@redhat.com> <20070809161024.GC8424@linux.vnet.ibm.com> <46BB4281.7010803@redhat.com> <20070809165853.GD8424@linux.vnet.ibm.com> <46BB4B7B.4070007@redhat.com> <20070809174150.GE8424@linux.vnet.ibm.com> <46BB5960.9040009@redhat.com> <20070809184531.GH8424@linux.vnet.ibm.com> In-Reply-To: <20070809184531.GH8424@linux.vnet.ibm.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2195 Lines: 38 Paul E. McKenney wrote: > On Thu, Aug 09, 2007 at 02:13:52PM -0400, Chris Snook wrote: >> Paul E. McKenney wrote: >>> On Thu, Aug 09, 2007 at 01:14:35PM -0400, Chris Snook wrote: >>>> If you're depending on volatile writes >>>> being visible to other CPUs, you're screwed either way, because the CPU >>>> can hold that data in cache as long as it wants before it writes it to >>>> memory. When this finally does happen, it will happen atomically, which >>>> is all that atomic_set guarantees. If you need to guarantee that the >>>> value is written to memory at a particular time in your execution >>>> sequence, you either have to read it from memory to force the compiler to >>>> store it first (and a volatile cast in atomic_read will suffice for this) >>>> or you have to use LOCK_PREFIX instructions which will invalidate remote >>>> cache lines containing the same variable. This patch doesn't change >>>> either of these cases. >>> The case that it -can- change is interactions with interrupt handlers. >>> And NMI/SMI handlers, for that matter. >> You have a point here, but only if you can guarantee that the interrupt >> handler is running on a processor sharing the cache that has the >> not-yet-written volatile value. That implies a strictly non-SMP >> architecture. At the moment, none of those have volatile in their >> declaration of atomic_t, so this patch can't break any of them. > > This can also happen when using per-CPU variables. And there are a > number of per-CPU variables that are either atomic themselves or are > structures containing atomic fields. Accessing per-CPU variables in this fashion reliably already requires a suitable smp/non-smp read/write memory barrier. I maintain that if we break anything with this change, it was really already broken, if less obviously. Can you give a real or synthetic example of legitimate code that could break? -- Chris - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/