On Tue, Dec 1, 2020 at 6:39 AM Mathieu Desnoyers <[email protected]> wrote: > > ----- On Nov 30, 2020, at 12:50 PM, Andy Lutomirski [email protected] wrote: > [...] > > diff --git a/arch/x86/mm/tlb.c b/arch/x86/mm/tlb.c > > index 11666ba19b62..dabe683ab076 100644 > > --- a/arch/x86/mm/tlb.c > > +++ b/arch/x86/mm/tlb.c > > @@ -474,8 +474,10 @@ void switch_mm_irqs_off(struct mm_struct *prev, struct > > mm_struct *next, > > /* > > * The membarrier system call requires a full memory barrier and > > * core serialization before returning to user-space, after > > - * storing to rq->curr. Writing to CR3 provides that full > > - * memory barrier and core serializing instruction. > > + * storing to rq->curr, when changing mm. This is because > > membarrier() > > + * sends IPIs to all CPUs that are in the target mm, but another > > + * CPU switch to the target mm in the mean time. > > The sentence "This is because membarrier() sends IPIs to all CPUs that are in > the target mm, but another CPU switch to the target mm in the mean time." > seems > rather unclear. Could be clarified with e.g.: > > "This is because membarrier() sends IPIs to all CPUs that are in the target mm > to make them issue memory barriers. However, if another CPU switches to/from > the > target mm concurrently with membarrier(), it can cause that CPU not to > receive the > IPI when it really should issue a memory barrier." > > For the rest of this patch: > > Reviewed-by: Mathieu Desnoyers <[email protected]> > > Thanks!
Done, thanks! > > Mathieu > > > -- > Mathieu Desnoyers > EfficiOS Inc. > http://www.efficios.com

