aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@kernel.org>2016-01-12 15:47:40 -0500
committerIngo Molnar <mingo@kernel.org>2016-01-13 04:42:49 -0500
commit4eaffdd5a5fe6ff9f95e1ab4de1ac904d5e0fa8b (patch)
tree81737b8f921080f0a4a5860bda80877c14772beb
parent65cacec1ba908a153cfb19c4de596a108f95970c (diff)
x86/mm: Improve switch_mm() barrier comments
My previous comments were still a bit confusing and there was a typo. Fix it up. Reported-by: Peter Zijlstra <peterz@infradead.org> Signed-off-by: Andy Lutomirski <luto@kernel.org> Cc: Andy Lutomirski <luto@amacapital.net> Cc: Borislav Petkov <bp@alien8.de> Cc: Brian Gerst <brgerst@gmail.com> Cc: Dave Hansen <dave.hansen@linux.intel.com> Cc: Denys Vlasenko <dvlasenk@redhat.com> Cc: H. Peter Anvin <hpa@zytor.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Rik van Riel <riel@redhat.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: stable@vger.kernel.org Fixes: 71b3c126e611 ("x86/mm: Add barriers and document switch_mm()-vs-flush synchronization") Link: http://lkml.kernel.org/r/0a0b43cdcdd241c5faaaecfbcc91a155ddedc9a1.1452631609.git.luto@kernel.org Signed-off-by: Ingo Molnar <mingo@kernel.org>
-rw-r--r--arch/x86/include/asm/mmu_context.h15
1 files changed, 8 insertions, 7 deletions
diff --git a/arch/x86/include/asm/mmu_context.h b/arch/x86/include/asm/mmu_context.h
index 1edc9cd198b8..bfd9b2a35a0b 100644
--- a/arch/x86/include/asm/mmu_context.h
+++ b/arch/x86/include/asm/mmu_context.h
@@ -132,14 +132,16 @@ static inline void switch_mm(struct mm_struct *prev, struct mm_struct *next,
132 * be sent, and CPU 0's TLB will contain a stale entry.) 132 * be sent, and CPU 0's TLB will contain a stale entry.)
133 * 133 *
134 * The bad outcome can occur if either CPU's load is 134 * The bad outcome can occur if either CPU's load is
135 * reordered before that CPU's store, so both CPUs much 135 * reordered before that CPU's store, so both CPUs must
136 * execute full barriers to prevent this from happening. 136 * execute full barriers to prevent this from happening.
137 * 137 *
138 * Thus, switch_mm needs a full barrier between the 138 * Thus, switch_mm needs a full barrier between the
139 * store to mm_cpumask and any operation that could load 139 * store to mm_cpumask and any operation that could load
140 * from next->pgd. This barrier synchronizes with 140 * from next->pgd. TLB fills are special and can happen
141 * remote TLB flushers. Fortunately, load_cr3 is 141 * due to instruction fetches or for no reason at all,
142 * serializing and thus acts as a full barrier. 142 * and neither LOCK nor MFENCE orders them.
143 * Fortunately, load_cr3() is serializing and gives the
144 * ordering guarantee we need.
143 * 145 *
144 */ 146 */
145 load_cr3(next->pgd); 147 load_cr3(next->pgd);
@@ -188,9 +190,8 @@ static inline void switch_mm(struct mm_struct *prev, struct mm_struct *next,
188 * tlb flush IPI delivery. We must reload CR3 190 * tlb flush IPI delivery. We must reload CR3
189 * to make sure to use no freed page tables. 191 * to make sure to use no freed page tables.
190 * 192 *
191 * As above, this is a barrier that forces 193 * As above, load_cr3() is serializing and orders TLB
192 * TLB repopulation to be ordered after the 194 * fills with respect to the mm_cpumask write.
193 * store to mm_cpumask.
194 */ 195 */
195 load_cr3(next->pgd); 196 load_cr3(next->pgd);
196 trace_tlb_flush(TLB_FLUSH_ON_TASK_SWITCH, TLB_FLUSH_ALL); 197 trace_tlb_flush(TLB_FLUSH_ON_TASK_SWITCH, TLB_FLUSH_ALL);