Re: [PATCH 24/24] document volatile atomic_read() behavior
From: Segher Boessenkool
Date: Thu Aug 09 2007 - 12:07:05 EST
Historically this has been
+accomplished by declaring the counter itself to be volatile, but the
+ambiguity of the C standard on the semantics of volatile make this
practice
+vulnerable to overly creative interpretation by compilers.
It's even worse when accessing through a volatile casted pointer;
see for example the recent(*) GCC bugs in that area.
(*) Well, not _all_ that recent. No one should be using the 3.x
series anymore, right?
Explicit
+casting in atomic_read() ensures consistent behavior across
architectures
+and compilers.
Even modulo compiler bugs, what makes you believe that?
Segher
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/