From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755238AbbAFMzn (ORCPT ); Tue, 6 Jan 2015 07:55:43 -0500 Received: from mail-qa0-f49.google.com ([209.85.216.49]:57073 "EHLO mail-qa0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752714AbbAFMzm (ORCPT ); Tue, 6 Jan 2015 07:55:42 -0500 Message-ID: <54ABDB4B.7070008@hurleysoftware.com> Date: Tue, 06 Jan 2015 07:55:39 -0500 From: Peter Hurley User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: Peter Zijlstra , Kent Overstreet CC: Sedat Dilek , Dave Jones , Linus Torvalds , LKML , Chris Mason , "Paul E. McKenney" Subject: Re: Linux 3.19-rc3 References: <20150106094039.GI29390@twins.programming.kicks-ass.net> <20150106100621.GL29390@twins.programming.kicks-ass.net> <20150106110112.GQ29390@twins.programming.kicks-ass.net> <20150106110730.GA25846@kmo-pixel> <20150106114215.GS29390@twins.programming.kicks-ass.net> <20150106114842.GP10476@twins.programming.kicks-ass.net> <20150106120121.GB26845@kmo-pixel> <20150106122006.GW29390@twins.programming.kicks-ass.net> In-Reply-To: <20150106122006.GW29390@twins.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ +cc Paul McKenney ] On 01/06/2015 07:20 AM, Peter Zijlstra wrote: > On Tue, Jan 06, 2015 at 04:01:21AM -0800, Kent Overstreet wrote: >> On Tue, Jan 06, 2015 at 12:48:42PM +0100, Peter Zijlstra wrote: >>> >>> >>> Looking at that closure stuff, why is there an smp_mb() in >>> closure_wake_up() ? Typically wakeup only needs to imply a wmb. >>> >>> Also note that __closure_wake_up() starts with a fully serializing >>> instruction (xchg) and thereby already implies the full barrier. >> >> Probably no good reason, that code is pretty old :) >> >> If I was to hazard a guess, I had my own lockless linked lists before llist.h >> existed and perhaps I did it with atomic_xchg() - which was at least documented >> to not imply a barrier. I suppose it should just be dropped. > > We (probably me) should probably audit all the atomic_xchg() > implementations and documentation and fix that. I was very much under > the impression it should imply a full barrier (and it certainly does on > x86), the documentation should state the rule that any atomic_ function > that returns a result is fully serializing, therefore, because > atomic_xchg() has a return value, it should too. memory-barriers.txt and atomic_ops.txt appear to contradict each other here, but I think that's because atomic_ops.txt has drifted toward an arch-implementer's POV: 260:atomic_xchg requires explicit memory barriers around the operation. All the serializing atomic operations have descriptions like this. Regards, Peter Hurley