The patch titled Another couple of alterations to the memory barrier doc has been removed from the -mm tree. Its filename is another-couple-of-alterations-to-the-memory-barrier-doc.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ Subject: Another couple of alterations to the memory barrier doc From: David Howells <dhowells@xxxxxxxxxx> Make another couple of alterations to the memory barrier document following suggestions by Alan Stern and in co-operation with Paul McKenney: (*) Rework the point of introduction of memory barriers and the description of what they are to reiterate why they're needed. (*) Modify a statement about the use of data dependency barriers to note that other barriers can be used instead (as they imply DD-barriers). Signed-off-by: David Howells <dhowells@xxxxxxxxxx> Acked-By: Paul E. McKenney <paulmck@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- Documentation/memory-barriers.txt | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff -puN Documentation/memory-barriers.txt~another-couple-of-alterations-to-the-memory-barrier-doc Documentation/memory-barriers.txt --- a/Documentation/memory-barriers.txt~another-couple-of-alterations-to-the-memory-barrier-doc +++ a/Documentation/memory-barriers.txt @@ -262,9 +262,14 @@ What is required is some way of interven CPU to restrict the order. Memory barriers are such interventions. They impose a perceived partial -ordering between the memory operations specified on either side of the barrier. -They request that the sequence of memory events generated appears to other -parts of the system as if the barrier is effective on that CPU. +ordering over the memory operations on either side of the barrier. + +Such enforcement is important because the CPUs and other devices in a system +can use a variety of tricks to improve performance - including reordering, +deferral and combination of memory operations; speculative loads; speculative +branch prediction and various types of caching. Memory barriers are used to +override or suppress these tricks, allowing the code to sanely control the +interaction of multiple CPUs and/or devices. VARIETIES OF MEMORY BARRIER @@ -461,8 +466,8 @@ Whilst this may seem like a failure of c isn't, and this behaviour can be observed on certain real CPUs (such as the DEC Alpha). -To deal with this, a data dependency barrier must be inserted between the -address load and the data load: +To deal with this, a data dependency barrier or better must be inserted +between the address load and the data load: CPU 1 CPU 2 =============== =============== _ Patches currently in -mm which might be from dhowells@xxxxxxxxxx are origin.patch gfs2-get_sb_dev-fix.patch net-rxrpc-use-list_move.patch fs-use-list_move.patch keys-sort-out-key-quota-system.patch keys-discard-the-contents-of-a-key-on-revocation.patch keys-let-keyctl_chown-change-a-keys-owner.patch keys-allocate-key-serial-numbers-randomly.patch keys-restrict-contents-of-proc-keys-to-viewable-keys.patch keys-add-a-way-to-store-the-appropriate-context-for-newly-created-keys.patch ecryptfs-get_sb_dev-fix.patch reiser4-get_sb_dev-fix.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html