Paul reported that X86_OOSTORE is dead, yay! Update a comment and remove a newly added reference. Reported-by: Paul Bolle <pebolle@tiscali.nl> Signed-off-by: Peter Zijlstra <peterz@infradead.org> Cc: Dave Jones <davej@redhat.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Paul E. McKenney <paulmck@linux.vnet.ibm.com> Cc: Waiman Long <Waiman.Long@hp.com> Cc: Will Deacon <will.deacon@arm.com> Link: http://lkml.kernel.org/r/20140611090509.GC3588@twins.programming.kicks-ass.net Signed-off-by: Ingo Molnar <mingo@kernel.org>
		
			
				
	
	
		
			157 lines
		
	
	
	
		
			4.4 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			157 lines
		
	
	
	
		
			4.4 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
#ifndef _ASM_X86_BARRIER_H
 | 
						|
#define _ASM_X86_BARRIER_H
 | 
						|
 | 
						|
#include <asm/alternative.h>
 | 
						|
#include <asm/nops.h>
 | 
						|
 | 
						|
/*
 | 
						|
 * Force strict CPU ordering.
 | 
						|
 * And yes, this is required on UP too when we're talking
 | 
						|
 * to devices.
 | 
						|
 */
 | 
						|
 | 
						|
#ifdef CONFIG_X86_32
 | 
						|
/*
 | 
						|
 * Some non-Intel clones support out of order store. wmb() ceases to be a
 | 
						|
 * nop for these.
 | 
						|
 */
 | 
						|
#define mb() alternative("lock; addl $0,0(%%esp)", "mfence", X86_FEATURE_XMM2)
 | 
						|
#define rmb() alternative("lock; addl $0,0(%%esp)", "lfence", X86_FEATURE_XMM2)
 | 
						|
#define wmb() alternative("lock; addl $0,0(%%esp)", "sfence", X86_FEATURE_XMM)
 | 
						|
#else
 | 
						|
#define mb() 	asm volatile("mfence":::"memory")
 | 
						|
#define rmb()	asm volatile("lfence":::"memory")
 | 
						|
#define wmb()	asm volatile("sfence" ::: "memory")
 | 
						|
#endif
 | 
						|
 | 
						|
/**
 | 
						|
 * read_barrier_depends - Flush all pending reads that subsequents reads
 | 
						|
 * depend on.
 | 
						|
 *
 | 
						|
 * No data-dependent reads from memory-like regions are ever reordered
 | 
						|
 * over this barrier.  All reads preceding this primitive are guaranteed
 | 
						|
 * to access memory (but not necessarily other CPUs' caches) before any
 | 
						|
 * reads following this primitive that depend on the data return by
 | 
						|
 * any of the preceding reads.  This primitive is much lighter weight than
 | 
						|
 * rmb() on most CPUs, and is never heavier weight than is
 | 
						|
 * rmb().
 | 
						|
 *
 | 
						|
 * These ordering constraints are respected by both the local CPU
 | 
						|
 * and the compiler.
 | 
						|
 *
 | 
						|
 * Ordering is not guaranteed by anything other than these primitives,
 | 
						|
 * not even by data dependencies.  See the documentation for
 | 
						|
 * memory_barrier() for examples and URLs to more information.
 | 
						|
 *
 | 
						|
 * For example, the following code would force ordering (the initial
 | 
						|
 * value of "a" is zero, "b" is one, and "p" is "&a"):
 | 
						|
 *
 | 
						|
 * <programlisting>
 | 
						|
 *	CPU 0				CPU 1
 | 
						|
 *
 | 
						|
 *	b = 2;
 | 
						|
 *	memory_barrier();
 | 
						|
 *	p = &b;				q = p;
 | 
						|
 *					read_barrier_depends();
 | 
						|
 *					d = *q;
 | 
						|
 * </programlisting>
 | 
						|
 *
 | 
						|
 * because the read of "*q" depends on the read of "p" and these
 | 
						|
 * two reads are separated by a read_barrier_depends().  However,
 | 
						|
 * the following code, with the same initial values for "a" and "b":
 | 
						|
 *
 | 
						|
 * <programlisting>
 | 
						|
 *	CPU 0				CPU 1
 | 
						|
 *
 | 
						|
 *	a = 2;
 | 
						|
 *	memory_barrier();
 | 
						|
 *	b = 3;				y = b;
 | 
						|
 *					read_barrier_depends();
 | 
						|
 *					x = a;
 | 
						|
 * </programlisting>
 | 
						|
 *
 | 
						|
 * does not enforce ordering, since there is no data dependency between
 | 
						|
 * the read of "a" and the read of "b".  Therefore, on some CPUs, such
 | 
						|
 * as Alpha, "y" could be set to 3 and "x" to 0.  Use rmb()
 | 
						|
 * in cases like this where there are no data dependencies.
 | 
						|
 **/
 | 
						|
 | 
						|
#define read_barrier_depends()	do { } while (0)
 | 
						|
 | 
						|
#ifdef CONFIG_SMP
 | 
						|
#define smp_mb()	mb()
 | 
						|
#ifdef CONFIG_X86_PPRO_FENCE
 | 
						|
# define smp_rmb()	rmb()
 | 
						|
#else
 | 
						|
# define smp_rmb()	barrier()
 | 
						|
#endif
 | 
						|
#define smp_wmb()	barrier()
 | 
						|
#define smp_read_barrier_depends()	read_barrier_depends()
 | 
						|
#define set_mb(var, value) do { (void)xchg(&var, value); } while (0)
 | 
						|
#else /* !SMP */
 | 
						|
#define smp_mb()	barrier()
 | 
						|
#define smp_rmb()	barrier()
 | 
						|
#define smp_wmb()	barrier()
 | 
						|
#define smp_read_barrier_depends()	do { } while (0)
 | 
						|
#define set_mb(var, value) do { var = value; barrier(); } while (0)
 | 
						|
#endif /* SMP */
 | 
						|
 | 
						|
#if defined(CONFIG_X86_PPRO_FENCE)
 | 
						|
 | 
						|
/*
 | 
						|
 * For this option x86 doesn't have a strong TSO memory
 | 
						|
 * model and we should fall back to full barriers.
 | 
						|
 */
 | 
						|
 | 
						|
#define smp_store_release(p, v)						\
 | 
						|
do {									\
 | 
						|
	compiletime_assert_atomic_type(*p);				\
 | 
						|
	smp_mb();							\
 | 
						|
	ACCESS_ONCE(*p) = (v);						\
 | 
						|
} while (0)
 | 
						|
 | 
						|
#define smp_load_acquire(p)						\
 | 
						|
({									\
 | 
						|
	typeof(*p) ___p1 = ACCESS_ONCE(*p);				\
 | 
						|
	compiletime_assert_atomic_type(*p);				\
 | 
						|
	smp_mb();							\
 | 
						|
	___p1;								\
 | 
						|
})
 | 
						|
 | 
						|
#else /* regular x86 TSO memory ordering */
 | 
						|
 | 
						|
#define smp_store_release(p, v)						\
 | 
						|
do {									\
 | 
						|
	compiletime_assert_atomic_type(*p);				\
 | 
						|
	barrier();							\
 | 
						|
	ACCESS_ONCE(*p) = (v);						\
 | 
						|
} while (0)
 | 
						|
 | 
						|
#define smp_load_acquire(p)						\
 | 
						|
({									\
 | 
						|
	typeof(*p) ___p1 = ACCESS_ONCE(*p);				\
 | 
						|
	compiletime_assert_atomic_type(*p);				\
 | 
						|
	barrier();							\
 | 
						|
	___p1;								\
 | 
						|
})
 | 
						|
 | 
						|
#endif
 | 
						|
 | 
						|
/* Atomic operations are already serializing on x86 */
 | 
						|
#define smp_mb__before_atomic()	barrier()
 | 
						|
#define smp_mb__after_atomic()	barrier()
 | 
						|
 | 
						|
/*
 | 
						|
 * Stop RDTSC speculation. This is needed when you need to use RDTSC
 | 
						|
 * (or get_cycles or vread that possibly accesses the TSC) in a defined
 | 
						|
 * code region.
 | 
						|
 *
 | 
						|
 * (Could use an alternative three way for this if there was one.)
 | 
						|
 */
 | 
						|
static __always_inline void rdtsc_barrier(void)
 | 
						|
{
 | 
						|
	alternative(ASM_NOP3, "mfence", X86_FEATURE_MFENCE_RDTSC);
 | 
						|
	alternative(ASM_NOP3, "lfence", X86_FEATURE_LFENCE_RDTSC);
 | 
						|
}
 | 
						|
 | 
						|
#endif /* _ASM_X86_BARRIER_H */
 |