Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751915Ab1E2Hiv (ORCPT ); Sun, 29 May 2011 03:38:51 -0400 Received: from mx3.mail.elte.hu ([157.181.1.138]:59217 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751253Ab1E2Hit (ORCPT ); Sun, 29 May 2011 03:38:49 -0400 Date: Sun, 29 May 2011 09:38:40 +0200 From: Ingo Molnar To: Eric Dumazet Cc: Arun Sharma , David Miller , Maximilian Engelhardt , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, StuStaNet Vorstand , Yann Dupont , Denys Fedoryshchenko , Thomas Gleixner Subject: Re: Kernel crash after using new Intel NIC (igb) Message-ID: <20110529073840.GB21254@elte.hu> References: <4DDECA9B.8080206@fb.com> <1306447292.2543.32.camel@edumazet-laptop> <4DDEEBC5.80804@fb.com> <1306466831.2543.58.camel@edumazet-laptop> <4DDFE4D6.4010000@fb.com> <1306526219.2533.3.camel@edumazet-laptop> <20110527211419.GA6793@dev1756.snc6.facebook.com> <1306561285.2533.9.camel@edumazet-laptop> <20110528180434.GB12530@elte.hu> <1306654424.30021.7.camel@edumazet-laptop> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1306654424.30021.7.camel@edumazet-laptop> User-Agent: Mutt/1.5.20 (2009-08-17) X-ELTE-SpamScore: -2.0 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-2.0 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.3.1 -2.0 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1355 Lines: 41 * Eric Dumazet wrote: > Le samedi 28 mai 2011 ? 20:04 +0200, Ingo Molnar a ?crit : > > * Eric Dumazet wrote: > > > > > > +static inline int atomic_add_unless(atomic_t *v, int a, int u) > > > > +{ > > > > + return __atomic_add_unless(v, a, u) != u; > > > > } > > > > > > > > #define atomic_inc_not_zero(v) atomic_add_unless((v), 1, 0) > > > > > > As I said, atomic_add_unless() has several implementations in > > > various arches. You must take care of all, not only x86. > > > > It's a bit sad to see local hacks to generic facilities committed > > upstream like that. > > > > Again, its a stable candidate patch, on a file that had many changes in > recent kernels. > > I felt this was the right thing to do, to ease stable teams work. Yes and i do this all the time as well, to make life easier for the stable team. What wasnt fine was to not follow up the backportable hack with the proper patch though. Or did you plan to do that yourself if Arun fails to complete the generic variant? (in which case my remark is moot) Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/