From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ozlabs.org (ozlabs.org [IPv6:2401:3900:2:1::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 73B841A0035 for ; Mon, 29 Feb 2016 22:05:24 +1100 (AEDT) In-Reply-To: <56CC3CDD.8040006@linux.vnet.ibm.com> To: xinhui , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org From: Michael Ellerman Cc: "Peter Zijlstra \(Intel\)" , Boqun Feng , Paul Mackerras , Thomas Gleixner , "Paul E. McKenney" Subject: Re: [V2] arch/powerpc: use BUILD_BUG_ON_MSG() when detect unfit {cmp}xchg size Message-Id: <20160229110524.59951140662@ozlabs.org> Date: Mon, 29 Feb 2016 22:05:24 +1100 (AEDT) List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, 2016-23-02 at 11:05:01 UTC, xinhui wrote: > From: pan xinhui > > __xchg_called_with_bad_pointer() can't tell us what codes use {cmp}xchg > in incorrect way. And no error will be reported until the link stage. > To fix such a kind of issues easily, we use BUILD_BUG_ON_MSG() here. > > Signed-off-by: pan xinhui Applied to powerpc next, thanks. https://git.kernel.org/powerpc/c/10d8b1480e6966ba03cd3afad3 cheers