This one is the big bug bear.  The DMA-mapping.txt doc says 
pci_alloc_consistent "may be called in interrupt context".  Thus if the 
dma_alloc with GFP_ATOMIC uses the same code path, it should be safe.  
However, there are indications that pci_alloc_consistent wasn't interrupt safe 
on certain platforms (see other email re PA-RISC).
In any event, we're no worse off than we were with the pci_ API.  Passing in 
the flags will hopefully allow us to create GFP_ATOMIC safe paths in the arch 
implementations which look iffy.
James
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/