Re: [PATCH -tip 2/2 resend] x86, traps: Drop nmi_reason_lock untilit is really needed

From: Cyrill Gorcunov
Date: Wed Mar 02 2011 - 11:13:49 EST


On 03/02/2011 07:03 PM, Ingo Molnar wrote:
...
>
> Well, the lock serializes the read-out of the 'NMI reason' port, the handling of
> whatever known reason and then the reassertion of the NMI (on 32-bit).
>
> EDAC has a callback in pci_serr_error() - and this lock serializes that. So we
> cannot just remove a lock like that, if there's any chance of parallel execution on
> multiple CPUs.
>
> Thanks,
>
> Ingo

OK, probably we need some UV person CC'ed (not sure whom) just to explain the
reason for such nmi-listening model. Meanwhile -- lets drop my patch.

--
Cyrill
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/