Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1533699ybi; Sat, 25 May 2019 04:15:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqyARoaHYo80OrPi9ggFPFhOoDajZoF2pcrN0DPpiJroeNi1ffbiKlZftWZ7dOwbXUJmrG6s X-Received: by 2002:aa7:930e:: with SMTP id 14mr61274745pfj.262.1558782946680; Sat, 25 May 2019 04:15:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558782946; cv=none; d=google.com; s=arc-20160816; b=f3YxbhIF1gR1o37ntQ2oFrkOaTGKZqsjzOfJYlIDgzvOS7dDAQ7yPFGRWel67pCnPs /MuibegT5zH0aQX8HbdTm8WwWhLP9pCry3KFcUBKEP5BShMW3RObSfQTeR7Qs+GycIQm 9gnS3mSrqDqKdb+FRNnCL2Uoi+k34WFo3fL8V0Pgxldh36uZNoewkB1cv7mrEPAkofWD WMugf89t1FRIcLcyy92m6CWrbCfu2C/xiEcQkmaEOUvnHqdMquk9ACoq2FjxaTVMAeoj 3xt2/dUWBxhlXsxyMEJKMkwKdOigqPP2OUgLdh4JRjl2lizAjy8nuicNn7e8Sn/g99jg I56Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=lpLpUHig9Lvf5QAcanzusMZq8fP+WF1DddTng/OjTAY=; b=L5+A57snpJLVKyD37dDi3LLvvZszRECie+jq9nStL+PBk7m9rLg7gKIq4krYB9gBFk hYqIfSvMtvJ6w4Mjk8EEchpluuKde3oa3vPsAbWxX40HNPZZGGmsk+A8X5NKUAlb7Aso vgUQ/CBQS2+piWwv/5PjuxXDYchJPoWxNnmDQm7H9psSJ6LlvvsfbujT8d+5xmQ7RoZS 8a3J1ezPqXQhpahiJ+adfCFwgHxB8yO0U6UK7WDMRx9SzyzVVC4OkHqBVvNOIV+5bobs hNVBgWZaVBlrWCd8aEl1UKxPrACKCHtJ7+DjnzEcLm4atHMkwBEagJZHZOjeQzfOnnOb CrrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a37si4995169pgm.574.2019.05.25.04.14.59; Sat, 25 May 2019 04:15:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726792AbfEYLIa (ORCPT + 99 others); Sat, 25 May 2019 07:08:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:38230 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726484AbfEYLIa (ORCPT ); Sat, 25 May 2019 07:08:30 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6B2D22085A; Sat, 25 May 2019 11:08:28 +0000 (UTC) Date: Sat, 25 May 2019 07:08:26 -0400 From: Steven Rostedt To: Joel Fernandes Cc: linux-kernel@vger.kernel.org, Benjamin Herrenschmidt , Ingo Molnar , Jonathan Corbet , Josh Triplett , kvm-ppc@vger.kernel.org, Lai Jiangshan , linux-doc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mathieu Desnoyers , Michael Ellerman , Miguel Ojeda , "Paul E. McKenney" , Paul Mackerras , rcu@vger.kernel.org Subject: Re: [PATCH RFC 0/5] Remove some notrace RCU APIs Message-ID: <20190525070826.16f76ee7@gandalf.local.home> In-Reply-To: <20190525081444.GC197789@google.com> References: <20190524234933.5133-1-joel@joelfernandes.org> <20190524232458.4bcf4eb4@gandalf.local.home> <20190525081444.GC197789@google.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 25 May 2019 04:14:44 -0400 Joel Fernandes wrote: > > I guess the difference between the _raw_notrace and just _raw variants > > is that _notrace ones do a rcu_check_sparse(). Don't we want to keep > > that check? > > This is true. > > Since the users of _raw_notrace are very few, is it worth keeping this API > just for sparse checking? The API naming is also confusing. I was expecting > _raw_notrace to do fewer checks than _raw, instead of more. Honestly, I just > want to nuke _raw_notrace as done in this series and later we can introduce a > sparse checking version of _raw if need-be. The other option could be to > always do sparse checking for _raw however that used to be the case and got > changed in http://lists.infradead.org/pipermail/linux-afs/2016-July/001016.html What if we just rename _raw to _raw_nocheck, and _raw_notrace to _raw ? -- Steve