Message ID | 20200710165203.31284-1-will@kernel.org (mailing list archive) |
---|---|
Headers | show |
Series | Allow architectures to override __READ_ONCE() | expand |
On Fri, Jul 10, 2020 at 05:51:44PM +0100, Will Deacon wrote: > SeongJae Park (1): > Documentation/barriers/kokr: Remove references to > [smp_]read_barrier_depends() > > Will Deacon (18): > tools: bpf: Use local copy of headers including uapi/linux/filter.h > compiler.h: Split {READ,WRITE}_ONCE definitions out into rwonce.h > asm/rwonce: Allow __READ_ONCE to be overridden by the architecture > alpha: Override READ_ONCE() with barriered implementation > asm/rwonce: Remove smp_read_barrier_depends() invocation > asm/rwonce: Don't pull <asm/barrier.h> into 'asm-generic/rwonce.h' > vhost: Remove redundant use of read_barrier_depends() barrier > alpha: Replace smp_read_barrier_depends() usage with smp_[r]mb() > locking/barriers: Remove definitions for [smp_]read_barrier_depends() > Documentation/barriers: Remove references to > [smp_]read_barrier_depends() > tools/memory-model: Remove smp_read_barrier_depends() from informal > doc > include/linux: Remove smp_read_barrier_depends() from comments > checkpatch: Remove checks relating to [smp_]read_barrier_depends() > arm64: Reduce the number of header files pulled into vmlinux.lds.S > arm64: alternatives: Split up alternative.h > arm64: cpufeatures: Add capability for LDAPR instruction > arm64: alternatives: Remove READ_ONCE() usage during patch operation > arm64: lto: Strengthen READ_ONCE() to acquire when CONFIG_LTO=y Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>