On Wed, Mar 03, 2010 at 12:03:45PM +0000, Catalin Marinas wrote: > > > My understanding from other comments in the kernel source is that the > > > SMP barriers are only meant or cacheable memory but there are drivers > > > that do something like below (e.g. drivers/net/r8169.c): > > > > > > /* We need for force the visibility of tp->intr_mask > > > * for other CPUs, as we can loose an MSI interrupt > > > * and potentially wait for a retransmit timeout if we don't. > > > * The posted write to IntrMask is safe, as it will > > > * eventually make it to the chip and we won't loose anything > > > * until it does. > > > */ > > > tp->intr_mask = 0xffff; > > > smp_wmb(); > > > RTL_W16(IntrMask, tp->intr_event); > > > > > > Is this supposed to work given the SMP barriers semantics? > > > > Well, if the smp_wmb() is supposed to make the assignment to > > tp->intr_mask globally visible before any effects of the RTL_W16(), > > then it's buggy. But from the comments it appears that the smp_wmb() > > might be intended to order the store to tp->intr_mask with respect to > > following cacheable stores, rather than with respect to the RTL_W16(), > > which would be OK. I can't say without having a much closer look at > > what that driver is actually doing. > > I cc'ed the r8169.c maintainer. > > But from the architectural support perspective, we don't need to support > more than a lightweight barrier in this case. Be afraid, very afraid when you find a non-SMP memory barrier in the kernel. A while ago I reviewed a number of uses throughout the kernel and each one of them was somehow buggy - either entirely unnecessary or should be replaced with an SMP memory barrier or was simple miss-placed. Ralf -- To unsubscribe from this list: send the line "unsubscribe linux-arch" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html