Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757205Ab1DHAcj (ORCPT ); Thu, 7 Apr 2011 20:32:39 -0400 Received: from mga09.intel.com ([134.134.136.24]:40647 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757197Ab1DHAch (ORCPT ); Thu, 7 Apr 2011 20:32:37 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.63,320,1299484800"; d="scan'208";a="625279420" Message-ID: <4D9E579C.3030101@intel.com> Date: Fri, 08 Apr 2011 08:32:28 +0800 From: Huang Ying User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.16) Gecko/20110303 Iceowl/1.0b1 Icedove/3.0.11 MIME-Version: 1.0 To: Russell King - ARM Linux CC: Len Brown , "linux-kernel@vger.kernel.org" , Andi Kleen , "Luck, Tony" , "linux-acpi@vger.kernel.org" , Richard Henderson , Mikael Starvik , David Howells , Yoshinori Sato , Hirokazu Takata , Geert Uytterhoeven , Michal Simek , Ralf Baechle , Kyle McMartin , Martin Schwidefsky , Chen Liqin , "David S. Miller" , Ingo Molnar , Chris Zankel Subject: Re: [PATCH -v2 1/4] Add Kconfig option ARCH_HAVE_NMI_SAFE_CMPXCHG References: <1302139746-1030-1-git-send-email-ying.huang@intel.com> <1302139746-1030-2-git-send-email-ying.huang@intel.com> <20110407173953.GB17049@n2100.arm.linux.org.uk> In-Reply-To: <20110407173953.GB17049@n2100.arm.linux.org.uk> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1157 Lines: 27 On 04/08/2011 01:39 AM, Russell King - ARM Linux wrote: > On Thu, Apr 07, 2011 at 09:29:03AM +0800, Huang Ying wrote: >> cmpxchg() is widely used by lockless code, including NMI-safe lockless >> code. But on some architectures, the cmpxchg() implementation is not >> NMI-safe, on these architectures the lockless code may need to a >> spin_trylock_irqsave() based implementation. >> >> This patch adds a Kconfig option: ARCH_HAVE_NMI_SAFE_CMPXCHG, so that >> NMI-safe lockless code can depend on it or provide different >> implementation according to it. >> >> On many architectures, cmpxchg is only NMI-safe for several specific >> operand sizes. So, ARCH_HAVE_NMI_SAFE_CMPXCHG define in this patch >> only guarantees cmpxchg is NMI-safe for sizeof(unsigned long). > > As this no longer touches any ARM code, I thinky you can drop me from the > CC list. Thanks. OK. Will do this. Best Regards, Huang Ying -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/