Received: by 10.192.165.156 with SMTP id m28csp289802imm; Tue, 17 Apr 2018 10:09:23 -0700 (PDT) X-Google-Smtp-Source: AIpwx49p1tXnlFwrq9Nq52Tc+lo5G1Q1wDtCxtfuhWdQhE7249aemvI5OjBmRRXoFiRk5fz63bHN X-Received: by 2002:a17:902:145:: with SMTP id 63-v6mr2797289plb.332.1523984963768; Tue, 17 Apr 2018 10:09:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523984963; cv=none; d=google.com; s=arc-20160816; b=Q7j4w74zAcvJfWoV+dg1PbU23lF/7MSLD9WCMtnUUQ/iJchJWOsAoHE1YR9CA0uvaL ldSbh+LJswY/L3APZ3zuoDoESKjEzjED/JwFCe/Ksdz+9wm92Ad3wIJ1SPlaFc9d/xhN S/t5Jc7Px/DgzAhIR7nHrljTz4H2qDeIEvRwlGHyECNQd7GCzDxhNRK9aKUqY0zVKtZg k7HY5hc461EXLZ8upW2H1xBFyK5hckrN8oMTbPo5s3kw8f1w7Xg8yuBs1aTvkRjvzJPZ 2dcFCBNPKnNs5ttjlplPU1gWZw9EK3BYrUBhE1PAEvt3p4kQEmf0n/IeuxKx5nrqzsK5 2Ddw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=FkPldN6bLqD0s7bebqOU0CB8jp9dCajVh0vYY5tlwgI=; b=CUZ7k0OtbvfcYtf/WL0JpTaNMieoIUcO+wN6MZpj0I9YrH3ETNf1uuB2YFbuZ/9gl+ +/RTE0HtaOgKpoNUsF2xmp+vmhanPSqb7rnYgf4jsrs95mqK0qQkKIQpcUs8dg52pypM mLoSENrdayMwFqn7Jwfrt5gc/PcOq+1N4W0KlqXPgbkwS0fUa7qj7tmTt+QuFAP1GBo9 QYQNC6AOLiNL4g/n1xOJAy2MUgYuVDh3I/z6dReWTNS9OopYrW0yNaLnpvUt+zDDFXCf tzqzRyOgIB89K96njw94f80tDMCZytVpDMvLCjmy14vEBbCw+BTbAhN49F9WanaIZYv/ K/6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e188si13292677pfe.103.2018.04.17.10.09.09; Tue, 17 Apr 2018 10:09:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753843AbeDQRGX (ORCPT + 99 others); Tue, 17 Apr 2018 13:06:23 -0400 Received: from mx2.suse.de ([195.135.220.15]:41894 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753088AbeDQRGW (ORCPT ); Tue, 17 Apr 2018 13:06:22 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id DB621AE21; Tue, 17 Apr 2018 17:06:20 +0000 (UTC) Date: Tue, 17 Apr 2018 09:52:10 -0700 From: Davidlohr Bueso To: kbuild test robot Cc: kbuild-all@01.org, peterz@infradead.org, tglx@linutronix.de, mingo@kernel.org, longman@redhat.com, linux-kernel@vger.kernel.org, Davidlohr Bueso Subject: Re: [PATCH 2/2] rtmutex: Reduce top-waiter blocking on a lock Message-ID: <20180417165210.xxtplqjkv46q4d4f@linux-n805> References: <20180410162750.8290-2-dave@stgolabs.net> <201804112023.tAv7vUah%fengguang.wu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <201804112023.tAv7vUah%fengguang.wu@intel.com> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 11 Apr 2018, kbuild test robot wrote: >Hi Davidlohr, > >I love your patch! Perhaps something to improve: > >[auto build test WARNING on linus/master] >[also build test WARNING on v4.16 next-20180411] >[if your patch is applied to the wrong git tree, please drop us a note to help improve the system] > >url: https://github.com/0day-ci/linux/commits/Davidlohr-Bueso/locking-rtmutex-Delete-save_state-member-of-struct-rt_mutex/20180411-155733 >reproduce: > # apt-get install sparse > make ARCH=x86_64 allmodconfig > make C=1 CF=-D__CHECK_ENDIAN__ Ok. > > >sparse warnings: (new ones prefixed by >>) > >>> kernel/locking/rtmutex_common.h:62:9: sparse: context imbalance in '__rt_mutex_slowlock' - unexpected unlock I did: make C=1 CF=-D__CHECK_ENDIAN__ kernel/locking/rtmutex.o But cannot trigger this message. There are however a ton of other sparse issues with 'indirect_branch'. Ie: ./arch/x86/include/asm/nospec-branch.h:144:38: warning: Unknown escape '@' ./include/linux/init.h:134:6: error: attribute 'indirect_branch': unknown attribute ./include/linux/init.h:135:5: error: attribute 'indirect_branch': unknown attribute More importantly, I don't follow where this "unexpected unlock" would come from considering that rtmutex doesn't use __acquires/__releases annotations. Nor do I understand why this patch would produce a new context imbalance. Thanks, Davidlohr