Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1077003ybi; Fri, 24 May 2019 16:51:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqxXCNUAtT8Bc6EGX70UWclxVAhfEFxr53FrE57SocC1/DWSQrlHH+tSZii43H5k5EXIVpgP X-Received: by 2002:a17:90a:9385:: with SMTP id q5mr12777729pjo.126.1558741904613; Fri, 24 May 2019 16:51:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558741904; cv=none; d=google.com; s=arc-20160816; b=lGP58t8ueb10yWC4B7kdM1Qvp4U9+MiGz596DfR4J5MqBzJEaS3VF6Ui2wONrJ0bjw VtvfERpnsme6QQWJMPYMXU8SOrG6ARqe/RzCfJPAwhM5NAaY/ijbdWkFvVIiOI1yuG+x VfynX8AmZO7t6cM9sEHVTDODvUaoxZXeNGhFaYDaQabxYHHeVCaeJWJ2XRa+/wAjxNFM u7pO1QvuobNUz7nuJJQ4tynTFLqY5424YkDxmzX0suxUTxfq0U3HCElct0zOdvMW9lol ghfq2bkAJq54EDye8a9DMRjLxc4VcJfVLhLY8GarYORSfGNRCTMh9HKz9TZnrQkqL0zZ 9pqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=vI/URisWdNsNzQF7SjQP4jM4uavWaFDPsfP7AjJ8IiNc/D10nzTE69ALlkiGwKIsw8 Bgkuc2W5XII4worirf2JGK84Jh5UDBZpUizEzzu0nGXUq+yem3es1d/kCXESIGztiPv2 1adAkIcvJdvPHoU6ZxbVzEHKTebAGZfo/jGnzbYDBupLoXAiIfd0tIYxJ8dWpZwOGJN0 wAdymybrXjXKlinsf5Irpy/7Ai9+2dA2S5aOMZWIKGBrmxHdnqVjkvV4fezEJdvoUehY 7jaflyMM0VZhnRTH3KL7tayjfL4yU5cDCt9Xk6XNn4r4zLz4Y9vVhGtbMiaVz550G7cG kEhw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=ExaDqp0k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n4si5734454pgt.597.2019.05.24.16.51.28; Fri, 24 May 2019 16:51:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=ExaDqp0k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726482AbfEXXuJ (ORCPT + 99 others); Fri, 24 May 2019 19:50:09 -0400 Received: from mail-pf1-f194.google.com ([209.85.210.194]:33498 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726441AbfEXXuG (ORCPT ); Fri, 24 May 2019 19:50:06 -0400 Received: by mail-pf1-f194.google.com with SMTP id z28so6205402pfk.0 for ; Fri, 24 May 2019 16:50:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=ExaDqp0kDit6EEuSOcT+FAdLJsr3wasxUTshDnisEPTxiqbsM/iwHBlK5jmEac4uTx 1WrmYkFMfBW8Hthn8w/kr+CT1si+DUZOuwzHNsk8UBPZv3PhzihaZaVz4saSEqQb9A8/ P62/INsuK+8WFv0NR63C1VMqjfsXLMIYivmZQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4IUQP+uKyCN66rRAguQBd+uSI/nPEDtpoZNPuNABz7k=; b=OlDt5bkCHeO+kkFfbGc81BEqpvWAjLESdSVARxnxEpOjey6hSNOvUhxGNOHMmCNsDD EAEamN4D5ApWGGSOSZ5EfkDH5P5DuFyK98+ycixPySNt5YNZakIVnReGD4vJvuLue0gH pYtyEphvs8KOX/BtbdkJZ6y0P9xeRwkbNukNjgPaVRhC11GF6kvLs9ZNeAiSI4Dy7fek rPmR1aSqQkGZ4Bxi0/uu2YqDOuyiyJDLbcWZJgEUe0uQMjX5V/e6OGJ9Qy8r6stM4ozv zojxZxR6PETzaKu64+h39cm5KVTDE6G849M54Da3Zjyy3MdjPI5JfPPEsNmcKrdmPfA6 Do5w== X-Gm-Message-State: APjAAAURyOWIOd0r+caUpgvPC8JetjensvX5LBQLntFbHa0yLbAu1zZI 8ZTDrAA8sSaHJNPjm+Qa5WscWWZHaAxUHg== X-Received: by 2002:a17:90a:372a:: with SMTP id u39mr12987526pjb.19.1558741804955; Fri, 24 May 2019 16:50:04 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id q4sm3297595pgb.39.2019.05.24.16.50.02 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Fri, 24 May 2019 16:50:04 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Cc: "Joel Fernandes (Google)" , Benjamin Herrenschmidt , Ingo Molnar , Jonathan Corbet , Josh Triplett , kvm-ppc@vger.kernel.org, Lai Jiangshan , linux-doc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mathieu Desnoyers , Michael Ellerman , Miguel Ojeda , "Paul E. McKenney" , Paul Mackerras , rcu@vger.kernel.org, Steven Rostedt Subject: [PATCH RFC 5/5] rcu: Remove rcu_dereference_raw_notrace since no users Date: Fri, 24 May 2019 19:49:33 -0400 Message-Id: <20190524234933.5133-6-joel@joelfernandes.org> X-Mailer: git-send-email 2.22.0.rc1.257.g3120a18244-goog In-Reply-To: <20190524234933.5133-1-joel@joelfernandes.org> References: <20190524234933.5133-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The series removes all users of the API and with this patch, the API itself. Also fix documentation. Signed-off-by: Joel Fernandes (Google) --- Documentation/RCU/Design/Requirements/Requirements.html | 6 +++--- include/linux/rcupdate.h | 9 --------- 2 files changed, 3 insertions(+), 12 deletions(-) diff --git a/Documentation/RCU/Design/Requirements/Requirements.html b/Documentation/RCU/Design/Requirements/Requirements.html index 5a9238a2883c..9727278893e6 100644 --- a/Documentation/RCU/Design/Requirements/Requirements.html +++ b/Documentation/RCU/Design/Requirements/Requirements.html @@ -2512,9 +2512,9 @@ disabled across the entire RCU read-side critical section.

It is possible to use tracing on RCU code, but tracing itself uses RCU. -For this reason, rcu_dereference_raw_notrace() -is provided for use by tracing, which avoids the destructive -recursion that could otherwise ensue. +This is the other reason for using, rcu_dereference_raw(), +for use by tracing, which avoids the destructive recursion that could +otherwise ensue. This API is also used by virtualization in some architectures, where RCU readers execute in environments in which tracing cannot be used. diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h index 922bb6848813..f917a27fc115 100644 --- a/include/linux/rcupdate.h +++ b/include/linux/rcupdate.h @@ -472,15 +472,6 @@ static inline void rcu_preempt_sleep_check(void) { } __rcu_dereference_check((p), (c) || rcu_read_lock_sched_held(), \ __rcu) -/* - * The tracing infrastructure traces RCU (we want that), but unfortunately - * some of the RCU checks causes tracing to lock up the system. - * - * The no-tracing version of rcu_dereference_raw() must not call - * rcu_read_lock_held(). - */ -#define rcu_dereference_raw_notrace(p) __rcu_dereference_check((p), 1, __rcu) - /** * rcu_dereference_protected() - fetch RCU pointer when updates prevented * @p: The pointer to read, prior to dereferencing -- 2.22.0.rc1.257.g3120a18244-goog