From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756801AbbJ2HLZ (ORCPT ); Thu, 29 Oct 2015 03:11:25 -0400 Received: from mail.kernel.org ([198.145.29.136]:37866 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756244AbbJ2HKg (ORCPT ); Thu, 29 Oct 2015 03:10:36 -0400 Message-Id: <20151029071032.496848028@goodmis.org> User-Agent: quilt/0.61-1 Date: Thu, 29 Oct 2015 03:07:59 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Ingo Molnar , Andrew Morton , kbuild test robot Subject: [for-next][PATCH 5/5] tracing: Fix sparse RCU warning References: <20151029070754.584668951@goodmis.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline; filename=0005-tracing-Fix-sparse-RCU-warning.patch Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Steven Rostedt (Red Hat)" p_start() and p_stop() are seq_file functions that match. Teach sparse to know that rcu_read_lock_sched() that is taken by p_start() is released by p_stop. Reported-by: kbuild test robot Signed-off-by: Steven Rostedt --- kernel/trace/trace_events.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/trace/trace_events.c b/kernel/trace/trace_events.c index 2b7fccd499c6..fb0261e90acc 100644 --- a/kernel/trace/trace_events.c +++ b/kernel/trace/trace_events.c @@ -938,6 +938,7 @@ static void t_stop(struct seq_file *m, void *p) } static void *p_start(struct seq_file *m, loff_t *pos) + __acquires(RCU) { struct trace_pid_list *pid_list; struct trace_array *tr = m->private; @@ -960,6 +961,7 @@ static void *p_start(struct seq_file *m, loff_t *pos) } static void p_stop(struct seq_file *m, void *p) + __releases(RCU) { rcu_read_unlock_sched(); mutex_unlock(&event_mutex); -- 2.6.1