Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752187AbaBUCNr (ORCPT ); Thu, 20 Feb 2014 21:13:47 -0500 Received: from mail-qc0-f176.google.com ([209.85.216.176]:59013 "EHLO mail-qc0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751104AbaBUCNp (ORCPT ); Thu, 20 Feb 2014 21:13:45 -0500 Date: Thu, 20 Feb 2014 21:13:41 -0500 From: Tejun Heo To: Peter Hurley Cc: laijs@cn.fujitsu.com, linux-kernel@vger.kernel.org, Stefan Richter , linux1394-devel@lists.sourceforge.net, Chris Boot , linux-scsi@vger.kernel.org, target-devel@vger.kernel.org Subject: Re: [PATCH 4/9] firewire: don't use PREPARE_DELAYED_WORK Message-ID: <20140221021341.GG6897@htj.dyndns.org> References: <1392929071-16555-1-git-send-email-tj@kernel.org> <1392929071-16555-5-git-send-email-tj@kernel.org> <5306AF8E.3080006@hurleysoftware.com> <20140221015935.GF6897@htj.dyndns.org> <5306B4DF.4000901@hurleysoftware.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5306B4DF.4000901@hurleysoftware.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 20, 2014 at 09:07:27PM -0500, Peter Hurley wrote: > On 02/20/2014 08:59 PM, Tejun Heo wrote: > >Hello, > > > >On Thu, Feb 20, 2014 at 08:44:46PM -0500, Peter Hurley wrote: > >>>+static void fw_device_workfn(struct work_struct *work) > >>>+{ > >>>+ struct fw_device *device = container_of(to_delayed_work(work), > >>>+ struct fw_device, work); > >> > >>I think this needs an smp_rmb() here. > > > >The patch is equivalent transformation and the whole thing is > >guaranteed to have gone through pool->lock. No explicit rmb > >necessary. > > The spin_unlock_irq(&pool->lock) only guarantees completion of > memory operations _before_ the unlock; memory operations which occur > _after_ the unlock may be speculated before the unlock. > > IOW, unlock is not a memory barrier for operations that occur after. It's not just unlock. It's lock / unlock pair on the same lock from both sides. Nothing can sip through that. -- tejun -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/