From owner-svn-src-all@FreeBSD.ORG Sun Mar 29 21:21:48 2015 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C908C6C9; Sun, 29 Mar 2015 21:21:48 +0000 (UTC) Received: from cell.glebius.int.ru (glebius.int.ru [81.19.69.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "cell.glebius.int.ru", Issuer "cell.glebius.int.ru" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4A3C3C0B; Sun, 29 Mar 2015 21:21:47 +0000 (UTC) Received: from cell.glebius.int.ru (localhost [127.0.0.1]) by cell.glebius.int.ru (8.14.9/8.14.9) with ESMTP id t2TLLjxI039849 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 30 Mar 2015 00:21:45 +0300 (MSK) (envelope-from glebius@FreeBSD.org) Received: (from glebius@localhost) by cell.glebius.int.ru (8.14.9/8.14.9/Submit) id t2TLLjZY039848; Mon, 30 Mar 2015 00:21:45 +0300 (MSK) (envelope-from glebius@FreeBSD.org) X-Authentication-Warning: cell.glebius.int.ru: glebius set sender to glebius@FreeBSD.org using -f Date: Mon, 30 Mar 2015 00:21:45 +0300 From: Gleb Smirnoff To: Adrian Chadd Subject: Re: svn commit: r280759 - head/sys/netinet Message-ID: <20150329212145.GC64665@FreeBSD.org> References: <201503271326.t2RDQxd3056112@svn.freebsd.org> <20150328083443.GV64665@FreeBSD.org> <20150328191629.GY64665@FreeBSD.org> <5517B433.5010508@selasky.org> <20150329210757.GA64665@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Cc: Hans Petter Selasky , "svn-src-head@freebsd.org" , "svn-src-all@freebsd.org" , "src-committers@freebsd.org" , Fabien Thomas X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Mar 2015 21:21:48 -0000 On Sun, Mar 29, 2015 at 02:15:43PM -0700, Adrian Chadd wrote: A> > To illustrate the probability of 1 instruction race, I would suggest to A> > look at PCPU_ADD() implementation for all arches except amd64/i386 and A> > find out that it is prone to this race. Hitting the race in PCPU_ADD() A> > will usually lead to mangling vm_meter statistics. Did we ever observe A> > this in practice? No. A> A> I dunno. Has anyone actually looked at that? :) A> A> On a busy system you may find those small race windows exist enough to A> be annoying. Case in point - the recent callout code race. The race A> between "read" "modify" "write" was tiny, but enough to break things. The difference is that in callout it lead to an endless loop, and in discussed case it leads to IP ID reuse, which already is happening all the time. -- Totus tuus, Glebius.