[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B82CF1A.3010501@nortel.com>
Date: Mon, 22 Feb 2010 12:38:18 -0600
From: "Chris Friesen" <cfriesen@...tel.com>
To: Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
CC: linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org,
KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>,
Steven Rostedt <rostedt@...dmis.org>,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Nicholas Miell <nmiell@...cast.net>,
Linus Torvalds <torvalds@...ux-foundation.org>, mingo@...e.hu,
laijs@...fujitsu.com, dipankar@...ibm.com,
akpm@...ux-foundation.org, josh@...htriplett.org,
dvhltc@...ibm.com, niv@...ibm.com, tglx@...utronix.de,
peterz@...radead.org, Valdis.Kletnieks@...edu, dhowells@...hat.com
Subject: Re: [RFC patch] introduce sys_membarrier(): process-wide memory barrier
(v9)
On 02/12/2010 04:46 PM, Mathieu Desnoyers wrote:
> Editorial question:
>
> This synchronization only takes care of threads using the current process memory
> map. It should not be used to synchronize accesses performed on memory maps
> shared between different processes. Is that a limitation we can live with ?
It makes sense for an initial version. It would be unfortunate if this
were a permanent limitation, since using separate processes with
explicit shared memory is a useful way to mitigate memory trampler issues.
If we were going to allow that, it might make sense to add an address
range such that only those processes which have mapped that range would
execute the barrier. Come to think of it, it might be possible to use
this somehow to avoid having to execute the barrier on *all* threads
within a process.
Chris
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists