From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 48E9DC282E1 for ; Fri, 24 May 2019 23:50:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 19A982186A for ; Fri, 24 May 2019 23:50:11 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=joelfernandes.org header.i=@joelfernandes.org header.b="ExaDqp0k" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726494AbfEXXuJ (ORCPT ); Fri, 24 May 2019 19:50:09 -0400 Received: from mail-pf1-f194.google.com ([209.85.210.194]:33498 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726441AbfEXXuG (ORCPT ); Fri, 24 May 2019 19:50:06 -0400 Received: by mail-pf1-f194.google.com with SMTP id z28so6205402pfk.0 for ; Fri, 24 May 2019 16:50:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=ExaDqp0kDit6EEuSOcT+FAdLJsr3wasxUTshDnisEPTxiqbsM/iwHBlK5jmEac4uTx 1WrmYkFMfBW8Hthn8w/kr+CT1si+DUZOuwzHNsk8UBPZv3PhzihaZaVz4saSEqQb9A8/ P62/INsuK+8WFv0NR63C1VMqjfsXLMIYivmZQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=OlDt5bkCHeO+kkFfbGc81BEqpvWAjLESdSVARxnxEpOjey6hSNOvUhxGNOHMmCNsDD EAEamN4D5ApWGGSOSZ5EfkDH5P5DuFyK98+ycixPySNt5YNZakIVnReGD4vJvuLue0gH pYtyEphvs8KOX/BtbdkJZ6y0P9xeRwkbNukNjgPaVRhC11GF6kvLs9ZNeAiSI4Dy7fek rPmR1aSqQkGZ4Bxi0/uu2YqDOuyiyJDLbcWZJgEUe0uQMjX5V/e6OGJ9Qy8r6stM4ozv zojxZxR6PETzaKu64+h39cm5KVTDE6G849M54Da3Zjyy3MdjPI5JfPPEsNmcKrdmPfA6 Do5w== X-Gm-Message-State: APjAAAURyOWIOd0r+caUpgvPC8JetjensvX5LBQLntFbHa0yLbAu1zZI 8ZTDrAA8sSaHJNPjm+Qa5WscWWZHaAxUHg== X-Google-Smtp-Source: APXvYqxNGBpXom3Ado94lkiXFHwXNMChLcccb7ZkYxRn6dsfk/n65WIEwwfbkGKCqFKqFYilSX8ODw== X-Received: by 2002:a17:90a:372a:: with SMTP id u39mr12987526pjb.19.1558741804955; Fri, 24 May 2019 16:50:04 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id q4sm3297595pgb.39.2019.05.24.16.50.02 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Fri, 24 May 2019 16:50:04 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Cc: "Joel Fernandes (Google)" , Benjamin Herrenschmidt , Ingo Molnar , Jonathan Corbet , Josh Triplett , kvm-ppc@vger.kernel.org, Lai Jiangshan , linux-doc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mathieu Desnoyers , Michael Ellerman , Miguel Ojeda , "Paul E. McKenney" , Paul Mackerras , rcu@vger.kernel.org, Steven Rostedt Subject: [PATCH RFC 5/5] rcu: Remove rcu_dereference_raw_notrace since no users Date: Fri, 24 May 2019 19:49:33 -0400 Message-Id: <20190524234933.5133-6-joel@joelfernandes.org> X-Mailer: git-send-email 2.22.0.rc1.257.g3120a18244-goog In-Reply-To: <20190524234933.5133-1-joel@joelfernandes.org> References: <20190524234933.5133-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The series removes all users of the API and with this patch, the API itself. Also fix documentation. Signed-off-by: Joel Fernandes (Google) --- Documentation/RCU/Design/Requirements/Requirements.html | 6 +++--- include/linux/rcupdate.h | 9 --------- 2 files changed, 3 insertions(+), 12 deletions(-) diff --git a/Documentation/RCU/Design/Requirements/Requirements.html b/Documentation/RCU/Design/Requirements/Requirements.html index 5a9238a2883c..9727278893e6 100644 --- a/Documentation/RCU/Design/Requirements/Requirements.html +++ b/Documentation/RCU/Design/Requirements/Requirements.html @@ -2512,9 +2512,9 @@ disabled across the entire RCU read-side critical section.

It is possible to use tracing on RCU code, but tracing itself uses RCU. -For this reason, rcu_dereference_raw_notrace() -is provided for use by tracing, which avoids the destructive -recursion that could otherwise ensue. +This is the other reason for using, rcu_dereference_raw(), +for use by tracing, which avoids the destructive recursion that could +otherwise ensue. This API is also used by virtualization in some architectures, where RCU readers execute in environments in which tracing cannot be used. diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h index 922bb6848813..f917a27fc115 100644 --- a/include/linux/rcupdate.h +++ b/include/linux/rcupdate.h @@ -472,15 +472,6 @@ static inline void rcu_preempt_sleep_check(void) { } __rcu_dereference_check((p), (c) || rcu_read_lock_sched_held(), \ __rcu) -/* - * The tracing infrastructure traces RCU (we want that), but unfortunately - * some of the RCU checks causes tracing to lock up the system. - * - * The no-tracing version of rcu_dereference_raw() must not call - * rcu_read_lock_held(). - */ -#define rcu_dereference_raw_notrace(p) __rcu_dereference_check((p), 1, __rcu) - /** * rcu_dereference_protected() - fetch RCU pointer when updates prevented * @p: The pointer to read, prior to dereferencing -- 2.22.0.rc1.257.g3120a18244-goog From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 790D8C282E1 for ; Fri, 24 May 2019 23:57:35 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id E9F5120674 for ; Fri, 24 May 2019 23:57:34 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=joelfernandes.org header.i=@joelfernandes.org header.b="ExaDqp0k" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E9F5120674 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=joelfernandes.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 459jwY2674zDqnn for ; Sat, 25 May 2019 09:57:33 +1000 (AEST) Authentication-Results: lists.ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=joelfernandes.org (client-ip=2607:f8b0:4864:20::444; helo=mail-pf1-x444.google.com; envelope-from=joel@joelfernandes.org; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=joelfernandes.org Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=joelfernandes.org header.i=@joelfernandes.org header.b="ExaDqp0k"; dkim-atps=neutral Received: from mail-pf1-x444.google.com (mail-pf1-x444.google.com [IPv6:2607:f8b0:4864:20::444]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 459jlz162TzDqTy for ; Sat, 25 May 2019 09:50:07 +1000 (AEST) Received: by mail-pf1-x444.google.com with SMTP id d126so4001893pfd.2 for ; Fri, 24 May 2019 16:50:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=ExaDqp0kDit6EEuSOcT+FAdLJsr3wasxUTshDnisEPTxiqbsM/iwHBlK5jmEac4uTx 1WrmYkFMfBW8Hthn8w/kr+CT1si+DUZOuwzHNsk8UBPZv3PhzihaZaVz4saSEqQb9A8/ P62/INsuK+8WFv0NR63C1VMqjfsXLMIYivmZQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=dTv2O6BvnMD2kBme3L1L3HahFMowqNnaHXgRkJni9vpk8Cjml+LlcZVFEPDBhTHotG V2JU019CED/oCLLLlg3Ai84xj7xL9GLySvV0ogz8BWzHgmADOq9VEeDFwNlewkqtuXdn vGD1W7S+UskZ2VbHps4TFO30W9O0tYAPYukm9Pn1FsBg/rLiLenj/QygiQGP4Mx6cFKY 1KfK+LGvz9p/k1e9CczNxwj8nc/xUBTakNB7QW35Nv2B9hw/hJEXGNxd+zhs0bqbOb8j 3SEHdAIM6qRFRlHpap97hOjzKfTAaxRMrzFWQktVSzt5kxwvnegaJpd6cJYRICVS9N0W mHQA== X-Gm-Message-State: APjAAAW8VkBnJ+frEoOHynQNYbqQ2YPaKK6zaWTDnb+ToJ7ZIagk5euu u3tyWC0gfGNxUyAhJFbJFiS8Sew9Rw3Jwg== X-Google-Smtp-Source: APXvYqxNGBpXom3Ado94lkiXFHwXNMChLcccb7ZkYxRn6dsfk/n65WIEwwfbkGKCqFKqFYilSX8ODw== X-Received: by 2002:a17:90a:372a:: with SMTP id u39mr12987526pjb.19.1558741804955; Fri, 24 May 2019 16:50:04 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id q4sm3297595pgb.39.2019.05.24.16.50.02 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Fri, 24 May 2019 16:50:04 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Subject: [PATCH RFC 5/5] rcu: Remove rcu_dereference_raw_notrace since no users Date: Fri, 24 May 2019 19:49:33 -0400 Message-Id: <20190524234933.5133-6-joel@joelfernandes.org> X-Mailer: git-send-email 2.22.0.rc1.257.g3120a18244-goog In-Reply-To: <20190524234933.5133-1-joel@joelfernandes.org> References: <20190524234933.5133-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: rcu@vger.kernel.org, Jonathan Corbet , linux-doc@vger.kernel.org, Lai Jiangshan , Josh Triplett , kvm-ppc@vger.kernel.org, Miguel Ojeda , Ingo Molnar , Mathieu Desnoyers , Steven Rostedt , "Joel Fernandes \(Google\)" , "Paul E. McKenney" , linuxppc-dev@lists.ozlabs.org Errors-To: linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Sender: "Linuxppc-dev" The series removes all users of the API and with this patch, the API itself. Also fix documentation. Signed-off-by: Joel Fernandes (Google) --- Documentation/RCU/Design/Requirements/Requirements.html | 6 +++--- include/linux/rcupdate.h | 9 --------- 2 files changed, 3 insertions(+), 12 deletions(-) diff --git a/Documentation/RCU/Design/Requirements/Requirements.html b/Documentation/RCU/Design/Requirements/Requirements.html index 5a9238a2883c..9727278893e6 100644 --- a/Documentation/RCU/Design/Requirements/Requirements.html +++ b/Documentation/RCU/Design/Requirements/Requirements.html @@ -2512,9 +2512,9 @@ disabled across the entire RCU read-side critical section.

It is possible to use tracing on RCU code, but tracing itself uses RCU. -For this reason, rcu_dereference_raw_notrace() -is provided for use by tracing, which avoids the destructive -recursion that could otherwise ensue. +This is the other reason for using, rcu_dereference_raw(), +for use by tracing, which avoids the destructive recursion that could +otherwise ensue. This API is also used by virtualization in some architectures, where RCU readers execute in environments in which tracing cannot be used. diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h index 922bb6848813..f917a27fc115 100644 --- a/include/linux/rcupdate.h +++ b/include/linux/rcupdate.h @@ -472,15 +472,6 @@ static inline void rcu_preempt_sleep_check(void) { } __rcu_dereference_check((p), (c) || rcu_read_lock_sched_held(), \ __rcu) -/* - * The tracing infrastructure traces RCU (we want that), but unfortunately - * some of the RCU checks causes tracing to lock up the system. - * - * The no-tracing version of rcu_dereference_raw() must not call - * rcu_read_lock_held(). - */ -#define rcu_dereference_raw_notrace(p) __rcu_dereference_check((p), 1, __rcu) - /** * rcu_dereference_protected() - fetch RCU pointer when updates prevented * @p: The pointer to read, prior to dereferencing -- 2.22.0.rc1.257.g3120a18244-goog From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Joel Fernandes (Google)" Date: Fri, 24 May 2019 23:49:33 +0000 Subject: [PATCH RFC 5/5] rcu: Remove rcu_dereference_raw_notrace since no users Message-Id: <20190524234933.5133-6-joel@joelfernandes.org> List-Id: References: <20190524234933.5133-1-joel@joelfernandes.org> In-Reply-To: <20190524234933.5133-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: linux-kernel@vger.kernel.org Cc: "Joel Fernandes (Google)" , Benjamin Herrenschmidt , Ingo Molnar , Jonathan Corbet , Josh Triplett , kvm-ppc@vger.kernel.org, Lai Jiangshan , linux-doc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mathieu Desnoyers , Michael Ellerman , Miguel Ojeda , "Paul E. McKenney" , Paul Mackerras , rcu@vger.kernel.org, Steven Rostedt The series removes all users of the API and with this patch, the API itself. Also fix documentation. Signed-off-by: Joel Fernandes (Google) --- Documentation/RCU/Design/Requirements/Requirements.html | 6 +++--- include/linux/rcupdate.h | 9 --------- 2 files changed, 3 insertions(+), 12 deletions(-) diff --git a/Documentation/RCU/Design/Requirements/Requirements.html b/Documentation/RCU/Design/Requirements/Requirements.html index 5a9238a2883c..9727278893e6 100644 --- a/Documentation/RCU/Design/Requirements/Requirements.html +++ b/Documentation/RCU/Design/Requirements/Requirements.html @@ -2512,9 +2512,9 @@ disabled across the entire RCU read-side critical section.

It is possible to use tracing on RCU code, but tracing itself uses RCU. -For this reason, rcu_dereference_raw_notrace() -is provided for use by tracing, which avoids the destructive -recursion that could otherwise ensue. +This is the other reason for using, rcu_dereference_raw(), +for use by tracing, which avoids the destructive recursion that could +otherwise ensue. This API is also used by virtualization in some architectures, where RCU readers execute in environments in which tracing cannot be used. diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h index 922bb6848813..f917a27fc115 100644 --- a/include/linux/rcupdate.h +++ b/include/linux/rcupdate.h @@ -472,15 +472,6 @@ static inline void rcu_preempt_sleep_check(void) { } __rcu_dereference_check((p), (c) || rcu_read_lock_sched_held(), \ __rcu) -/* - * The tracing infrastructure traces RCU (we want that), but unfortunately - * some of the RCU checks causes tracing to lock up the system. - * - * The no-tracing version of rcu_dereference_raw() must not call - * rcu_read_lock_held(). - */ -#define rcu_dereference_raw_notrace(p) __rcu_dereference_check((p), 1, __rcu) - /** * rcu_dereference_protected() - fetch RCU pointer when updates prevented * @p: The pointer to read, prior to dereferencing -- 2.22.0.rc1.257.g3120a18244-goog