Blame view

kernel/linux-rt-4.4.41/arch/sparc/include/asm/barrier_64.h 2.39 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
  #ifndef __SPARC64_BARRIER_H
  #define __SPARC64_BARRIER_H
  
  /* These are here in an effort to more fully work around Spitfire Errata
   * #51.  Essentially, if a memory barrier occurs soon after a mispredicted
   * branch, the chip can stop executing instructions until a trap occurs.
   * Therefore, if interrupts are disabled, the chip can hang forever.
   *
   * It used to be believed that the memory barrier had to be right in the
   * delay slot, but a case has been traced recently wherein the memory barrier
   * was one instruction after the branch delay slot and the chip still hung.
   * The offending sequence was the following in sym_wakeup_done() of the
   * sym53c8xx_2 driver:
   *
   *	call	sym_ccb_from_dsa, 0
   *	 movge	%icc, 0, %l0
   *	brz,pn	%o0, .LL1303
   *	 mov	%o0, %l2
   *	membar	#LoadLoad
   *
   * The branch has to be mispredicted for the bug to occur.  Therefore, we put
   * the memory barrier explicitly into a "branch always, predicted taken"
   * delay slot to avoid the problem case.
   */
  #define membar_safe(type) \
  do {	__asm__ __volatile__("ba,pt	%%xcc, 1f
  \t" \
  			     " membar	" type "
  " \
  			     "1:
  " \
  			     : : : "memory"); \
  } while (0)
  
  /* The kernel always executes in TSO memory model these days,
   * and furthermore most sparc64 chips implement more stringent
   * memory ordering than required by the specifications.
   */
  #define mb()	membar_safe("#StoreLoad")
  #define rmb()	__asm__ __volatile__("":::"memory")
  #define wmb()	__asm__ __volatile__("":::"memory")
  
  #define dma_rmb()	rmb()
  #define dma_wmb()	wmb()
  
  #define smp_store_mb(__var, __value) \
  	do { WRITE_ONCE(__var, __value); membar_safe("#StoreLoad"); } while(0)
  
  #ifdef CONFIG_SMP
  #define smp_mb()	mb()
  #define smp_rmb()	rmb()
  #define smp_wmb()	wmb()
  #else
  #define smp_mb()	__asm__ __volatile__("":::"memory")
  #define smp_rmb()	__asm__ __volatile__("":::"memory")
  #define smp_wmb()	__asm__ __volatile__("":::"memory")
  #endif
  
  #define read_barrier_depends()		do { } while (0)
  #define smp_read_barrier_depends()	do { } while (0)
  
  #define smp_store_release(p, v)						\
  do {									\
  	compiletime_assert_atomic_type(*p);				\
  	barrier();							\
  	WRITE_ONCE(*p, v);						\
  } while (0)
  
  #define smp_load_acquire(p)						\
  ({									\
  	typeof(*p) ___p1 = READ_ONCE(*p);				\
  	compiletime_assert_atomic_type(*p);				\
  	barrier();							\
  	___p1;								\
  })
  
  #define smp_mb__before_atomic()	barrier()
  #define smp_mb__after_atomic()	barrier()
  
  #endif /* !(__SPARC64_BARRIER_H) */