jiffies is (as of 2.4.7 anyways) marked as volatile, so we're safe there. My
point is this--should someone writing badly designed (but technically correct)
code be able to totally hose the system?
The only difference between volatile and normal is that if it is marked as
volatile it must be accessed every time rather than being pre-cached. If we
never spin on accessing xtime, then the fact that we can't optimize it shouldn't
hurt. (Am I wrong here? If I am then please explain because I'm missing
something...) If someone ever *does* spin on xtime, then we really don't want
to optimize that access out of the loop, because doing so could cause nasty
problems.
-- Chris Friesen | MailStop: 043/33/F10 Nortel Networks | work: (613) 765-0557 3500 Carling Avenue | fax: (613) 765-2986 Nepean, ON K2H 8E9 Canada | email: cfriesen@nortelnetworks.com - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/