|
@@ -4,8 +4,24 @@
|
|
|
|
|
|
By: David Howells <dhowells@redhat.com>
|
|
|
Paul E. McKenney <paulmck@linux.vnet.ibm.com>
|
|
|
+ Will Deacon <will.deacon@arm.com>
|
|
|
+ Peter Zijlstra <peterz@infradead.org>
|
|
|
|
|
|
-Contents:
|
|
|
+==========
|
|
|
+DISCLAIMER
|
|
|
+==========
|
|
|
+
|
|
|
+This document is not a specification; it is intentionally (for the sake of
|
|
|
+brevity) and unintentionally (due to being human) incomplete. This document is
|
|
|
+meant as a guide to using the various memory barriers provided by Linux, but
|
|
|
+in case of any doubt (and there are many) please ask.
|
|
|
+
|
|
|
+To repeat, this document is not a specification of what Linux expects from
|
|
|
+hardware.
|
|
|
+
|
|
|
+========
|
|
|
+CONTENTS
|
|
|
+========
|
|
|
|
|
|
(*) Abstract memory access model.
|
|
|
|