Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4053142ybx; Mon, 4 Nov 2019 07:07:34 -0800 (PST) X-Google-Smtp-Source: APXvYqxeiL6QtVvpJKATF2k1vSAUEEQIqRVcDUyVfjTD0mxcAzl9SeezAZpqyisGFSdWPCeqlhgx X-Received: by 2002:a05:6402:602:: with SMTP id n2mr9327053edv.23.1572880054528; Mon, 04 Nov 2019 07:07:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572880054; cv=none; d=google.com; s=arc-20160816; b=VukVdIb4Y1kQxxImntn+qHnq5yYLhgGzQRCrqekYBzFAoJIAe3ec6oZf2CUgX2r/Ec IzW3/lWnW7FnxL32hM484ncr7lWf7Mhl0teInlam2jWhBJeGcjkcJ279VjU75OrBlqqs lI8CUCt/hzWtPKdQjOHIhV9sDVhgCOQbBgG9q5p0pKz7REF+IHhSkYsv3MnrMCKbstoU 0vjjer3HCfDdw+p4HEt+sbQXeBbB470VuUxKwrXMXjvhdTIcsEJ3ns1rrwfF4huukIsZ 9D/FRiDClJx1WF1Erwhjs+TjFKpBmRJ282rOtNeqtofxWpOKdqcPV7cXmYhB27dg7aMI /Lsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=ZU+m7BTVHZILkqW3dXaXIhxP/n5NtqhgNjW6GsZys18=; b=eCxnHM+r3s4j/eqp8oImf4BzEpvs8ATZ/9rGP8Qb1P5HVstK2fK8H/+p2gBuIZBvYF fum6bPLviGQuAoHYkAQ/Wz98PZJqSDI8M5xEgBdX9rBqhXNl/Hi5mq9tfRfZcKZZo3VT z8kwSDV3N2Kjn9650xdhn3RUZnR8RU2Z8he5eg9/KIF82j/T8J7E4v+D+EIJuBkOip/A Q6gNSiJD7tUkmfmaoIjf4WxVf7DgVu8M2PzH9+YUMCOQD9WPVFSJb09NmL8VBjgSjIgj pfo6gsApKVywVNSkB7dgX5oQPHpg2o5Dw4ExuV053n4UejpIYGhHxkFmwHmMKDIJOOgS zg9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=didDH6wf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id be23si3509014edb.103.2019.11.04.07.07.10; Mon, 04 Nov 2019 07:07:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=didDH6wf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728924AbfKDPDc (ORCPT + 99 others); Mon, 4 Nov 2019 10:03:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:58436 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727788AbfKDPDc (ORCPT ); Mon, 4 Nov 2019 10:03:32 -0500 Received: from paulmck-ThinkPad-P72.home (unknown [109.144.216.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 535AB20659; Mon, 4 Nov 2019 15:03:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572879810; bh=PgT8W6DftwnfwmGNL6dHObxLdmfDGv/U93yvXSQ/GmA=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=didDH6wfhWoEueBvV+kpDeLGrNZpzDEiT8R3wgovEhJ+9TYYxPCcEx6in8MlVSZal aKOtmgrtocgCI9iIwNO1qsAeb51/JxAj4daou2d8IISESH7oei6HiDgqTHpLZud/zl lHMhOkdNJ3IljwboHJIpLiM9oGu1dcdV3sYymlgQ= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 5A33D3520B56; Mon, 4 Nov 2019 07:03:28 -0800 (PST) Date: Mon, 4 Nov 2019 07:03:28 -0800 From: "Paul E. McKenney" To: Amol Grover Cc: Josh Triplett , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , Joel Fernandes , Jonathan Corbet , rcu@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, Shuah Khan Subject: Re: [PATCH] Documentation: RCU: whatisRCU: Fix formatting for section 2 Message-ID: <20191104150328.GZ20975@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20191104133315.GA14499@workstation-kernel-dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191104133315.GA14499@workstation-kernel-dev> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 04, 2019 at 07:03:15PM +0530, Amol Grover wrote: > Convert RCU API method text to sub-headings and > add hyperlink and superscript to 2 literary notes > under rcu_dereference() section > > Signed-off-by: Amol Grover Good stuff, but Phong Tran beat you to it. If you are suggesting changes to that patch, please send a reply to her email, which may be found here: https://lore.kernel.org/lkml/20191030233128.14997-1-tranmanphong@gmail.com/ There are several options for replying to this email listed at the bottom of that web page. Thanx, Paul > --- > Documentation/RCU/whatisRCU.rst | 34 +++++++++++++++++++++++++++------ > 1 file changed, 28 insertions(+), 6 deletions(-) > > diff --git a/Documentation/RCU/whatisRCU.rst b/Documentation/RCU/whatisRCU.rst > index ae40c8bcc56c..3cf6e17d0065 100644 > --- a/Documentation/RCU/whatisRCU.rst > +++ b/Documentation/RCU/whatisRCU.rst > @@ -150,6 +150,7 @@ later. See the kernel docbook documentation for more info, or look directly > at the function header comments. > > rcu_read_lock() > +^^^^^^^^^^^^^^^ > > void rcu_read_lock(void); > > @@ -164,6 +165,7 @@ rcu_read_lock() > longer-term references to data structures. > > rcu_read_unlock() > +^^^^^^^^^^^^^^^^^ > > void rcu_read_unlock(void); > > @@ -172,6 +174,7 @@ rcu_read_unlock() > read-side critical sections may be nested and/or overlapping. > > synchronize_rcu() > +^^^^^^^^^^^^^^^^^ > > void synchronize_rcu(void); > > @@ -225,6 +228,7 @@ synchronize_rcu() > checklist.txt for some approaches to limiting the update rate. > > rcu_assign_pointer() > +^^^^^^^^^^^^^^^^^^^^ > > void rcu_assign_pointer(p, typeof(p) v); > > @@ -245,6 +249,7 @@ rcu_assign_pointer() > the _rcu list-manipulation primitives such as list_add_rcu(). > > rcu_dereference() > +^^^^^^^^^^^^^^^^^ > > typeof(p) rcu_dereference(p); > > @@ -279,8 +284,10 @@ rcu_dereference() > if an update happened while in the critical section, and incur > unnecessary overhead on Alpha CPUs. > > +.. _back_to_1: > + > Note that the value returned by rcu_dereference() is valid > - only within the enclosing RCU read-side critical section [1]. > + only within the enclosing RCU read-side critical section |cs_1|. > For example, the following is -not- legal:: > > rcu_read_lock(); > @@ -298,15 +305,27 @@ rcu_dereference() > it was acquired is just as illegal as doing so with normal > locking. > > +.. _back_to_2: > + > As with rcu_assign_pointer(), an important function of > rcu_dereference() is to document which pointers are protected by > RCU, in particular, flagging a pointer that is subject to changing > at any time, including immediately after the rcu_dereference(). > And, again like rcu_assign_pointer(), rcu_dereference() is > typically used indirectly, via the _rcu list-manipulation > - primitives, such as list_for_each_entry_rcu() [2]. > + primitives, such as list_for_each_entry_rcu() |entry_2|. > + > +.. |cs_1| raw:: html > + > + [1] > + > +.. |entry_2| raw:: html > > - [1] The variant rcu_dereference_protected() can be used outside > + [2] > + > +.. _cs: > + > + \ :sup:`[1]`\ The variant rcu_dereference_protected() can be used outside > of an RCU read-side critical section as long as the usage is > protected by locks acquired by the update-side code. This variant > avoids the lockdep warning that would happen when using (for > @@ -317,15 +336,18 @@ rcu_dereference() > a lockdep expression to indicate which locks must be acquired > by the caller. If the indicated protection is not provided, > a lockdep splat is emitted. See Documentation/RCU/Design/Requirements/Requirements.rst > - and the API's code comments for more details and example usage. > + and the API's code comments for more details and example usage. :ref:`back ` > + > + > +.. _entry: > > - [2] If the list_for_each_entry_rcu() instance might be used by > + \ :sup:`[2]`\ If the list_for_each_entry_rcu() instance might be used by > update-side code as well as by RCU readers, then an additional > lockdep expression can be added to its list of arguments. > For example, given an additional "lock_is_held(&mylock)" argument, > the RCU lockdep code would complain only if this instance was > invoked outside of an RCU read-side critical section and without > - the protection of mylock. > + the protection of mylock. :ref:`back ` > > The following diagram shows how each API communicates among the > reader, updater, and reclaimer. > -- > 2.20.1 >