Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161025AbbENRwJ (ORCPT ); Thu, 14 May 2015 13:52:09 -0400 Received: from mail-bn1bon0146.outbound.protection.outlook.com ([157.56.111.146]:59472 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933764AbbENRwF (ORCPT ); Thu, 14 May 2015 13:52:05 -0400 Authentication-Results: linutronix.de; dkim=none (message not signed) header.d=none; Message-ID: <1431625901.3868.165.camel@freescale.com> Subject: Re: [PATCH v2 0/2] powerpc/kvm: Enable running guests on RT Linux From: Scott Wood To: Sebastian Andrzej Siewior CC: Bogdan Purcareata , , , , , , , , Date: Thu, 14 May 2015 12:51:41 -0500 In-Reply-To: <20150514153639.GA13442@linutronix.de> References: <1429890793-19487-1-git-send-email-bogdan.purcareata@freescale.com> <20150514153639.GA13442@linutronix.de> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.12.10-0ubuntu1~14.10.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Originating-IP: [2601:2:5800:3f7:12bf:48ff:fe84:c9a0] X-ClientProxiedBy: BLUPR11CA0047.namprd11.prod.outlook.com (10.141.30.15) To BLUPR03MB1474.namprd03.prod.outlook.com (25.163.81.16) X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR03MB1474; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(5005006)(3002001);SRVR:BLUPR03MB1474;BCL:0;PCL:0;RULEID:;SRVR:BLUPR03MB1474; X-Forefront-PRVS: 0576145E86 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(6009001)(24454002)(377424004)(51704005)(77096005)(103116003)(107886002)(5001960100002)(110136002)(46102003)(50986999)(76176999)(42186005)(189998001)(47776003)(122386002)(92566002)(50226001)(36756003)(50466002)(62966003)(33646002)(77156002)(2950100001)(40100003)(23676002)(87976001)(86362001)(5820100001)(3826002)(4001430100001);DIR:OUT;SFP:1102;SCL:1;SRVR:BLUPR03MB1474;H:[IPv6:2601:2:5800:3f7:12bf:48ff:fe84:c9a0];FPR:;SPF:None;MLV:sfv;LANG:en; X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 May 2015 17:52:02.5918 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR03MB1474 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 869 Lines: 21 On Thu, 2015-05-14 at 17:36 +0200, Sebastian Andrzej Siewior wrote: > * Bogdan Purcareata | 2015-04-24 15:53:11 [+0000]: > > >0001: converts the openpic spinlock to a raw spinlock, in order to circumvent > >0002: disables in-kernel MPIC emulation for guest running on RT, in order to > > Scott, I'm asking here for your explicit Acked-by on those two patches. > That you want it *that* way. We have now a nice explanation in #1 :) ACK patch 2 only. Patch 1 is unnecessary as long as we have patch 2, and the most likely long-term solutions do not involve converting all the locking in that file to a raw lock. -Scott -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/