Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754818Ab3I0NpH (ORCPT ); Fri, 27 Sep 2013 09:45:07 -0400 Received: from smtprelay0226.hostedemail.com ([216.40.44.226]:48654 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754304Ab3I0NpA (ORCPT ); Fri, 27 Sep 2013 09:45:00 -0400 X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,:::::::::::::::::::::::::::::::::::,RULES_HIT:41:355:379:541:599:973:982:988:989:1260:1261:1277:1311:1313:1314:1345:1359:1373:1437:1515:1516:1518:1534:1541:1593:1594:1711:1730:1747:1777:1792:1801:2393:2559:2562:2828:3138:3139:3140:3141:3142:3352:3622:3653:3867:3 X-HE-Tag: wrist55_4841dc2f51209 X-Filterd-Recvd-Size: 2929 Message-ID: <1380289495.17366.91.camel@joe-AO722> Subject: Re: [PATCH v6 5/6] MCS Lock: Restructure the MCS lock defines and locking code into its own file From: Joe Perches To: Peter Zijlstra Cc: Ingo Molnar , Tim Chen , Jason Low , Davidlohr Bueso , Ingo Molnar , Andrew Morton , Andrea Arcangeli , Alex Shi , Andi Kleen , Michel Lespinasse , Davidlohr Bueso , Matthew R Wilcox , Dave Hansen , Rik van Riel , Peter Hurley , linux-kernel@vger.kernel.org, linux-mm Date: Fri, 27 Sep 2013 06:44:55 -0700 In-Reply-To: <20130927112323.GJ3657@laptop.programming.kicks-ass.net> References: <1380147049.3467.67.camel@schen9-DESK> <1380226007.2170.2.camel@buesod1.americas.hpqcorp.net> <1380226997.2602.11.camel@j-VirtualBox> <1380228059.2170.10.camel@buesod1.americas.hpqcorp.net> <1380229794.2602.36.camel@j-VirtualBox> <1380231702.3467.85.camel@schen9-DESK> <1380235333.3229.39.camel@j-VirtualBox> <1380236265.3467.103.camel@schen9-DESK> <20130927060213.GA6673@gmail.com> <20130927112323.GJ3657@laptop.programming.kicks-ass.net> Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: Evolution 3.6.4-0ubuntu1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1247 Lines: 33 On Fri, 2013-09-27 at 13:23 +0200, Peter Zijlstra wrote: > checkpatch.pl should really warn about that; and it appears there > code in there for that; however: > > # grep -C3 smp_mb scripts/checkpatch.pl [] > # check for memory barriers without a comment. > if ($line =~ /\b(mb|rmb|wmb|read_barrier_depends|smp_mb|smp_rmb|smp_wmb|smp_read_barrier_depends)\(/) { > if (!ctx_has_comment($first_line, $linenr)) { > CHK("MEMORY_BARRIER", > "memory barrier without comment\n" . $herecurr); [] > # scripts/checkpatch.pl -f kernel/mutex.c 2>&1 | grep memory > # > > so that appears to be completely broken :/ > > Joe, any clue what's up with that? It's a CHK test, so it's only tested with --strict $ scripts/checkpatch.pl -f --strict kernel/mutex.c 2>&1 | grep memory CHECK: memory barrier without comment CHECK: memory barrier without comment It could be changed to WARN so it's always on. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/