[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1323546551.2822.14.camel@laptop>
Date: Sat, 10 Dec 2011 20:49:11 +0100
From: Peter Zijlstra <a.p.zijlstra@...llo.nl>
To: Ming Lei <tom.leiming@...il.com>
Cc: gregkh@...e.de, akpm@...ux-foundation.org,
linux-kernel@...r.kernel.org, ostrikov@...dia.com,
adobriyan@...il.com, eric.dumazet@...il.com, mingo@...e.hu,
Oliver Neukum <oneukum@...e.de>
Subject: Re: [PATCH 3/3] kref: Remove the memory barriers
On Sat, 2011-12-10 at 23:57 +0800, Ming Lei wrote:
> CPU0 CPU1
>
> atomic_set(v)
> smp_mb()
> smp_mb()
> atomic_dec_and_test(v)
>
> Without the barrier after atomic_set, CPU1 may see a stale
> value of v first, then decrease it, so may miss a release operation.
Your example is doubly broken. If there's concurrency possible with
atomic_set() you've lost.
Lets change it to kref_get() aka atomic_inc():
CPU0 CPU1
atomic_inc()
atomic_dec_and_test()
and
atomic_dec_and_test()
atomic_inc()
For if the first is possible, then so is the second.
This illustrates that no matter how many barriers you put in, you're
still up shit creek without no paddle because the kref_put() can come in
before you do the kref_get(), making the kref_get() the invalid
operation.
> The pair of smp_mb can make order between atomic_set
> and atomic_dec_and_test, can't it?
No. Because there's nothing stopping the dec from happening before the
set/inc.
> > If there's a destruction race with kref_put() the barrier won't
>
> Sorry, could you say what the destruction race is?
The race to 0-refs, iow. the case above when you assume both cases start
out with 1 ref.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists