Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753408Ab3I0OTP (ORCPT ); Fri, 27 Sep 2013 10:19:15 -0400 Received: from merlin.infradead.org ([205.233.59.134]:54391 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752155Ab3I0OTN (ORCPT ); Fri, 27 Sep 2013 10:19:13 -0400 Date: Fri, 27 Sep 2013 16:18:45 +0200 From: Peter Zijlstra To: Joe Perches Cc: Ingo Molnar , Tim Chen , Jason Low , Davidlohr Bueso , Ingo Molnar , Andrew Morton , Andrea Arcangeli , Alex Shi , Andi Kleen , Michel Lespinasse , Davidlohr Bueso , Matthew R Wilcox , Dave Hansen , Rik van Riel , Peter Hurley , linux-kernel@vger.kernel.org, linux-mm Subject: Re: [PATCH v6 5/6] MCS Lock: Restructure the MCS lock defines and locking code into its own file Message-ID: <20130927141845.GB15690@laptop.programming.kicks-ass.net> References: <1380228059.2170.10.camel@buesod1.americas.hpqcorp.net> <1380229794.2602.36.camel@j-VirtualBox> <1380231702.3467.85.camel@schen9-DESK> <1380235333.3229.39.camel@j-VirtualBox> <1380236265.3467.103.camel@schen9-DESK> <20130927060213.GA6673@gmail.com> <20130927112323.GJ3657@laptop.programming.kicks-ass.net> <1380289495.17366.91.camel@joe-AO722> <20130927134802.GA15690@laptop.programming.kicks-ass.net> <1380290700.17366.95.camel@joe-AO722> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1380290700.17366.95.camel@joe-AO722> User-Agent: Mutt/1.5.21 (2012-12-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1140 Lines: 28 On Fri, Sep 27, 2013 at 07:05:00AM -0700, Joe Perches wrote: > On Fri, 2013-09-27 at 15:48 +0200, Peter Zijlstra wrote: > > On Fri, Sep 27, 2013 at 06:44:55AM -0700, Joe Perches wrote: > > > It's a CHK test, so it's only tested with --strict > > > > > > $ scripts/checkpatch.pl -f --strict kernel/mutex.c 2>&1 | grep memory > > > CHECK: memory barrier without comment > > > CHECK: memory barrier without comment > > > > > > It could be changed to WARN so it's always on. > > > > Yes please, we can't be too careful with memory barriers. > > I'll send the patch separately. > > It seems a pretty noisy test. > There are 13 hits just in arch/x86/kernel/ Urgh. that wants fixing. We really need to stop getting more and that's where checkpatch is good at. At very very bare minimum the comment should mention where the pairing barrier is; but ideally it should describe the actual ordering. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/