[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46B894E4.4010501@nortel.com>
Date: Tue, 07 Aug 2007 09:51:00 -0600
From: "Chris Friesen" <cfriesen@...tel.com>
To: Chris Snook <csnook@...hat.com>
CC: Jerry Jiang <wjiang@...ilience.com>,
"Robert P. J. Day" <rpjday@...dspring.com>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: why are some atomic_t's not volatile, while most are?
Chris Snook wrote:
> If your architecture doesn't support SMP, the volatile keyword doesn't
> do anything except add a useless memory fetch.
I was under the impression that there were other cases as well
(interrupt handlers, for instance) where the value could be modified
"behind the back" of the current code.
It seems like this would fall more into the case of the arch providing
guarantees when using locked/atomic access rather than anything
SMP-related, no?.
Chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists