Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1007568ybx; Thu, 7 Nov 2019 05:59:32 -0800 (PST) X-Google-Smtp-Source: APXvYqytHKu/+TKdv7y5z+PYDrDfnZHNCl9PYH8vYk428Qyga2gqiTU772ep29iPkkuJNmuK0oQk X-Received: by 2002:aa7:d299:: with SMTP id w25mr3861625edq.14.1573135172229; Thu, 07 Nov 2019 05:59:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573135172; cv=none; d=google.com; s=arc-20160816; b=QZM7p25AoFZyOSM+XnsSvOZCeFbYC39/ufXAHAtxv5kzsDgjwWdNl8/SKkTV/ync8q aR45Ye8gyEqdtb0DUvfneG8rkQzsQNsqnEeG6/619S5oj1dkGV+G3fQjgBU/WszylL5n vtg1xhjNQymdDWmOWTQ1LpRJ0oJeCwtC9AoLj3WVBzLkZkDmg7rYDokfAUzlcA5alclp fXcl3FThLx7So2qpH/nvfs6GDZmtxXf3acO5jQRdeRMQyWLV3zvl7G1k5/JU+2FhdOVZ Qc5B1ClnjDMhQqdlzd44w8h5L0YtiWrse0kX3vsyLTjPR8n3YJivRSeu8KRHavhzXdQl sssQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc:dkim-signature; bh=UVeimx5r/eJQ5zu0d7qMhu1/9HxnAUtxBZjlkrYPIgk=; b=00xSa0DjwZQerwyO/z35MSbW2A+dYDRLLkf13Zu9bimbufFETRnLnw3osFUrqJ3xVn sPfp000SUTGVqeJ3bAK5rkyX6o3OzaSKR+4H6iZAF7p55ydKr1kZ1yFH6lxaZy3fCSG9 su/6pAHjlAm2vI8l6T/JOjTVcJVxn8vi9q+7iNpQ7i6et0X4SPnqG4lSrPN7JYSnUGfI 1YaY5Q+X/Sx/zrLVK1pAGc6ywTlPkexV0gdGcbBuo1i2o69wxFsnKAgXsM0FwGFpjW/q y7V7rSZ/+jKsAXlP+8PHsrdzef3wF1x1YuUAlGRifJIIhJjDwsNuN2KdB2AWlS8o0z81 1HgQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qDQihwLE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n2si1453061ejy.60.2019.11.07.05.59.07; Thu, 07 Nov 2019 05:59:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qDQihwLE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388456AbfKGN60 (ORCPT + 99 others); Thu, 7 Nov 2019 08:58:26 -0500 Received: from mail-pg1-f196.google.com ([209.85.215.196]:36315 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726754AbfKGN60 (ORCPT ); Thu, 7 Nov 2019 08:58:26 -0500 Received: by mail-pg1-f196.google.com with SMTP id k13so2233747pgh.3; Thu, 07 Nov 2019 05:58:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:subject:to:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=UVeimx5r/eJQ5zu0d7qMhu1/9HxnAUtxBZjlkrYPIgk=; b=qDQihwLE/3y6hc4cb96hawEr1p13at5cP+rs59XW+AST4gHF7vaZusXQRPNu1AbtiU 9ca1t08yAKRGkQWSTyWh6XYQoIY8I2lPATwKdnjON2+mYVhgsD34UaHp5WOZE5xgwz7a EN4W4Km1d3aqAYHvIsRjSFWTDXUcnhDljOEjj/WjCJYS0NM2qKuvYX71xtIRDBXMCF1M hO4oeMDrQ9U2zcFYE7JyQ28Tizti522onhhsYgdFHpwRWrUPI1LHoa4gNh1C3/RlTsVP V1EsHSpZPjVIFgSEHink19nnYf7YIT5DbjmPwPAb7wKPHsvtc09vqtrEAd3gdGCmKSCt swAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=UVeimx5r/eJQ5zu0d7qMhu1/9HxnAUtxBZjlkrYPIgk=; b=WgCMMBpFPzdmS4kPCcn5n/SZ8aUWTauXNx+2mRKy5qb1tEeDjgUy5PtmdvSfaMGQdJ KTPV3bvJmw67OfmRPY7kSEDM+NHkNGk0DHKGFXoY7SqZoeeHLPPtRlgZnjtfPK9FV3D8 kLk2J71KMh3ugrUlJa7JPHhjE7TdI3Cz4LQLeW8NJAOERHSxaZVU/2Wjo1OeikchutLO 1lnJe5FBb1coTdgvJ0o9dWXf5gsv/ku3A2snTZ0gVxQNa8LPBrpZnHedX9Xq4ToX4Ky/ 3a5mrmdrRQOD4eAe0hcWkL5YBuFwVQFJYZVuntGU6FcR9YswUjycvo6oyvlBND1GaHb+ ZUWA== X-Gm-Message-State: APjAAAUoQFIyvGqnD2vXdpm6n3PQ4Z/6GELRSFnlHJAhXvXasdQ68btV HD0GJF5y8yNykX/J6uEre+9gRMYM/dzr+Q== X-Received: by 2002:a63:f812:: with SMTP id n18mr4718352pgh.109.1573135103751; Thu, 07 Nov 2019 05:58:23 -0800 (PST) Received: from ?IPv6:2405:4800:58f7:3f8f:27cb:abb4:d0bd:49cb? ([2405:4800:58f7:3f8f:27cb:abb4:d0bd:49cb]) by smtp.gmail.com with ESMTPSA id p1sm2626851pfb.112.2019.11.07.05.58.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 07 Nov 2019 05:58:22 -0800 (PST) Cc: tranmanphong@gmail.com, rcu@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, Shuah Khan , Madhuparna Bhowmik Subject: Re: [PATCH v2] Documentation: RCU: rcubarrier: Convert to reST To: Amol Grover , "Paul E. McKenney" , Josh Triplett , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , Joel Fernandes , Jonathan Corbet References: <20191107063241.GA2234@workstation-kernel-dev> From: Phong Tran Message-ID: <3d3bf2ea-b8af-e561-a631-fb9205973e99@gmail.com> Date: Thu, 7 Nov 2019 20:58:18 +0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191107063241.GA2234@workstation-kernel-dev> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/7/19 1:32 PM, Amol Grover wrote: > Convert rcubarrier.txt to rcubarrier.rst and > add it to index.rst > > Format file according to reST > - Add headings and sub-headings > - Add code segments > - Add cross-references to quizes and answers > Tested-by: Phong Tran > Signed-off-by: Amol Grover > --- > Documentation/RCU/index.rst | 1 + > .../RCU/{rcubarrier.txt => rcubarrier.rst} | 222 ++++++++++-------- > 2 files changed, 126 insertions(+), 97 deletions(-) > rename Documentation/RCU/{rcubarrier.txt => rcubarrier.rst} (72%) > > diff --git a/Documentation/RCU/index.rst b/Documentation/RCU/index.rst > index c81d0e4fd999..81a0a1e5f767 100644 > --- a/Documentation/RCU/index.rst > +++ b/Documentation/RCU/index.rst > @@ -8,6 +8,7 @@ RCU concepts > :maxdepth: 3 > > arrayRCU > + rcubarrier > rcu_dereference > whatisRCU > rcu > diff --git a/Documentation/RCU/rcubarrier.txt b/Documentation/RCU/rcubarrier.rst > similarity index 72% > rename from Documentation/RCU/rcubarrier.txt > rename to Documentation/RCU/rcubarrier.rst > index a2782df69732..f64f4413a47c 100644 > --- a/Documentation/RCU/rcubarrier.txt > +++ b/Documentation/RCU/rcubarrier.rst > @@ -1,4 +1,7 @@ > +.. _rcu_barrier: > + > RCU and Unloadable Modules > +========================== > > [Originally published in LWN Jan. 14, 2007: http://lwn.net/Articles/217484/] > > @@ -21,7 +24,7 @@ given that readers might well leave absolutely no trace of their > presence? There is a synchronize_rcu() primitive that blocks until all > pre-existing readers have completed. An updater wishing to delete an > element p from a linked list might do the following, while holding an > -appropriate lock, of course: > +appropriate lock, of course:: > > list_del_rcu(p); > synchronize_rcu(); > @@ -32,13 +35,13 @@ primitive must be used instead. This primitive takes a pointer to an > rcu_head struct placed within the RCU-protected data structure and > another pointer to a function that may be invoked later to free that > structure. Code to delete an element p from the linked list from IRQ > -context might then be as follows: > +context might then be as follows:: > > list_del_rcu(p); > call_rcu(&p->rcu, p_callback); > > Since call_rcu() never blocks, this code can safely be used from within > -IRQ context. The function p_callback() might be defined as follows: > +IRQ context. The function p_callback() might be defined as follows:: > > static void p_callback(struct rcu_head *rp) > { > @@ -49,6 +52,7 @@ IRQ context. The function p_callback() might be defined as follows: > > > Unloading Modules That Use call_rcu() > +------------------------------------- > > But what if p_callback is defined in an unloadable module? > > @@ -69,10 +73,11 @@ in realtime kernels in order to avoid excessive scheduling latencies. > > > rcu_barrier() > +------------- > > We instead need the rcu_barrier() primitive. Rather than waiting for > a grace period to elapse, rcu_barrier() waits for all outstanding RCU > -callbacks to complete. Please note that rcu_barrier() does -not- imply > +callbacks to complete. Please note that rcu_barrier() does **not** imply > synchronize_rcu(), in particular, if there are no RCU callbacks queued > anywhere, rcu_barrier() is within its rights to return immediately, > without waiting for a grace period to elapse. > @@ -88,79 +93,79 @@ must match the flavor of rcu_barrier() with that of call_rcu(). If your > module uses multiple flavors of call_rcu(), then it must also use multiple > flavors of rcu_barrier() when unloading that module. For example, if > it uses call_rcu(), call_srcu() on srcu_struct_1, and call_srcu() on > -srcu_struct_2(), then the following three lines of code will be required > -when unloading: > +srcu_struct_2, then the following three lines of code will be required > +when unloading:: > > 1 rcu_barrier(); > 2 srcu_barrier(&srcu_struct_1); > 3 srcu_barrier(&srcu_struct_2); > > The rcutorture module makes use of rcu_barrier() in its exit function > -as follows: > +as follows:: > > - 1 static void > - 2 rcu_torture_cleanup(void) > - 3 { > - 4 int i; > + 1 static void > + 2 rcu_torture_cleanup(void) > + 3 { > + 4 int i; > 5 > - 6 fullstop = 1; > - 7 if (shuffler_task != NULL) { > + 6 fullstop = 1; > + 7 if (shuffler_task != NULL) { > 8 VERBOSE_PRINTK_STRING("Stopping rcu_torture_shuffle task"); > 9 kthread_stop(shuffler_task); > -10 } > -11 shuffler_task = NULL; > -12 > -13 if (writer_task != NULL) { > -14 VERBOSE_PRINTK_STRING("Stopping rcu_torture_writer task"); > -15 kthread_stop(writer_task); > -16 } > -17 writer_task = NULL; > -18 > -19 if (reader_tasks != NULL) { > -20 for (i = 0; i < nrealreaders; i++) { > -21 if (reader_tasks[i] != NULL) { > -22 VERBOSE_PRINTK_STRING( > -23 "Stopping rcu_torture_reader task"); > -24 kthread_stop(reader_tasks[i]); > -25 } > -26 reader_tasks[i] = NULL; > -27 } > -28 kfree(reader_tasks); > -29 reader_tasks = NULL; > -30 } > -31 rcu_torture_current = NULL; > -32 > -33 if (fakewriter_tasks != NULL) { > -34 for (i = 0; i < nfakewriters; i++) { > -35 if (fakewriter_tasks[i] != NULL) { > -36 VERBOSE_PRINTK_STRING( > -37 "Stopping rcu_torture_fakewriter task"); > -38 kthread_stop(fakewriter_tasks[i]); > -39 } > -40 fakewriter_tasks[i] = NULL; > -41 } > -42 kfree(fakewriter_tasks); > -43 fakewriter_tasks = NULL; > -44 } > -45 > -46 if (stats_task != NULL) { > -47 VERBOSE_PRINTK_STRING("Stopping rcu_torture_stats task"); > -48 kthread_stop(stats_task); > -49 } > -50 stats_task = NULL; > -51 > -52 /* Wait for all RCU callbacks to fire. */ > -53 rcu_barrier(); > -54 > -55 rcu_torture_stats_print(); /* -After- the stats thread is stopped! */ > -56 > -57 if (cur_ops->cleanup != NULL) > -58 cur_ops->cleanup(); > -59 if (atomic_read(&n_rcu_torture_error)) > -60 rcu_torture_print_module_parms("End of test: FAILURE"); > -61 else > -62 rcu_torture_print_module_parms("End of test: SUCCESS"); > -63 } > + 10 } > + 11 shuffler_task = NULL; > + 12 > + 13 if (writer_task != NULL) { > + 14 VERBOSE_PRINTK_STRING("Stopping rcu_torture_writer task"); > + 15 kthread_stop(writer_task); > + 16 } > + 17 writer_task = NULL; > + 18 > + 19 if (reader_tasks != NULL) { > + 20 for (i = 0; i < nrealreaders; i++) { > + 21 if (reader_tasks[i] != NULL) { > + 22 VERBOSE_PRINTK_STRING( > + 23 "Stopping rcu_torture_reader task"); > + 24 kthread_stop(reader_tasks[i]); > + 25 } > + 26 reader_tasks[i] = NULL; > + 27 } > + 28 kfree(reader_tasks); > + 29 reader_tasks = NULL; > + 30 } > + 31 rcu_torture_current = NULL; > + 32 > + 33 if (fakewriter_tasks != NULL) { > + 34 for (i = 0; i < nfakewriters; i++) { > + 35 if (fakewriter_tasks[i] != NULL) { > + 36 VERBOSE_PRINTK_STRING( > + 37 "Stopping rcu_torture_fakewriter task"); > + 38 kthread_stop(fakewriter_tasks[i]); > + 39 } > + 40 fakewriter_tasks[i] = NULL; > + 41 } > + 42 kfree(fakewriter_tasks); > + 43 fakewriter_tasks = NULL; > + 44 } > + 45 > + 46 if (stats_task != NULL) { > + 47 VERBOSE_PRINTK_STRING("Stopping rcu_torture_stats task"); > + 48 kthread_stop(stats_task); > + 49 } > + 50 stats_task = NULL; > + 51 > + 52 /* Wait for all RCU callbacks to fire. */ > + 53 rcu_barrier(); > + 54 > + 55 rcu_torture_stats_print(); /* -After- the stats thread is stopped! */ > + 56 > + 57 if (cur_ops->cleanup != NULL) > + 58 cur_ops->cleanup(); > + 59 if (atomic_read(&n_rcu_torture_error)) > + 60 rcu_torture_print_module_parms("End of test: FAILURE"); > + 61 else > + 62 rcu_torture_print_module_parms("End of test: SUCCESS"); > + 63 } > > Line 6 sets a global variable that prevents any RCU callbacks from > re-posting themselves. This will not be necessary in most cases, since > @@ -176,9 +181,14 @@ for any pre-existing callbacks to complete. > Then lines 55-62 print status and do operation-specific cleanup, and > then return, permitting the module-unload operation to be completed. > > -Quick Quiz #1: Is there any other situation where rcu_barrier() might > +.. _rcubarrier_quiz_1: > + > +Quick Quiz #1: > + Is there any other situation where rcu_barrier() might > be required? > > +:ref:`Answer to Quick Quiz #1 ` > + > Your module might have additional complications. For example, if your > module invokes call_rcu() from timers, you will need to first cancel all > the timers, and only then invoke rcu_barrier() to wait for any remaining > @@ -188,11 +198,12 @@ Of course, if you module uses call_rcu(), you will need to invoke > rcu_barrier() before unloading. Similarly, if your module uses > call_srcu(), you will need to invoke srcu_barrier() before unloading, > and on the same srcu_struct structure. If your module uses call_rcu() > --and- call_srcu(), then you will need to invoke rcu_barrier() -and- > +**and** call_srcu(), then you will need to invoke rcu_barrier() **and** > srcu_barrier(). > > > Implementing rcu_barrier() > +-------------------------- > > Dipankar Sarma's implementation of rcu_barrier() makes use of the fact > that RCU callbacks are never reordered once queued on one of the per-CPU > @@ -200,19 +211,19 @@ queues. His implementation queues an RCU callback on each of the per-CPU > callback queues, and then waits until they have all started executing, at > which point, all earlier RCU callbacks are guaranteed to have completed. > > -The original code for rcu_barrier() was as follows: > +The original code for rcu_barrier() was as follows:: > > - 1 void rcu_barrier(void) > - 2 { > - 3 BUG_ON(in_interrupt()); > - 4 /* Take cpucontrol mutex to protect against CPU hotplug */ > - 5 mutex_lock(&rcu_barrier_mutex); > - 6 init_completion(&rcu_barrier_completion); > - 7 atomic_set(&rcu_barrier_cpu_count, 0); > - 8 on_each_cpu(rcu_barrier_func, NULL, 0, 1); > - 9 wait_for_completion(&rcu_barrier_completion); > -10 mutex_unlock(&rcu_barrier_mutex); > -11 } > + 1 void rcu_barrier(void) > + 2 { > + 3 BUG_ON(in_interrupt()); > + 4 /* Take cpucontrol mutex to protect against CPU hotplug */ > + 5 mutex_lock(&rcu_barrier_mutex); > + 6 init_completion(&rcu_barrier_completion); > + 7 atomic_set(&rcu_barrier_cpu_count, 0); > + 8 on_each_cpu(rcu_barrier_func, NULL, 0, 1); > + 9 wait_for_completion(&rcu_barrier_completion); > + 10 mutex_unlock(&rcu_barrier_mutex); > + 11 } > > Line 3 verifies that the caller is in process context, and lines 5 and 10 > use rcu_barrier_mutex to ensure that only one rcu_barrier() is using the > @@ -226,18 +237,18 @@ This code was rewritten in 2008 and several times thereafter, but this > still gives the general idea. > > The rcu_barrier_func() runs on each CPU, where it invokes call_rcu() > -to post an RCU callback, as follows: > +to post an RCU callback, as follows:: > > - 1 static void rcu_barrier_func(void *notused) > - 2 { > - 3 int cpu = smp_processor_id(); > - 4 struct rcu_data *rdp = &per_cpu(rcu_data, cpu); > - 5 struct rcu_head *head; > + 1 static void rcu_barrier_func(void *notused) > + 2 { > + 3 int cpu = smp_processor_id(); > + 4 struct rcu_data *rdp = &per_cpu(rcu_data, cpu); > + 5 struct rcu_head *head; > 6 > - 7 head = &rdp->barrier; > - 8 atomic_inc(&rcu_barrier_cpu_count); > - 9 call_rcu(head, rcu_barrier_callback); > -10 } > + 7 head = &rdp->barrier; > + 8 atomic_inc(&rcu_barrier_cpu_count); > + 9 call_rcu(head, rcu_barrier_callback); > + 10 } > > Lines 3 and 4 locate RCU's internal per-CPU rcu_data structure, > which contains the struct rcu_head that needed for the later call to > @@ -248,20 +259,25 @@ the current CPU's queue. > > The rcu_barrier_callback() function simply atomically decrements the > rcu_barrier_cpu_count variable and finalizes the completion when it > -reaches zero, as follows: > +reaches zero, as follows:: > > 1 static void rcu_barrier_callback(struct rcu_head *notused) > 2 { > - 3 if (atomic_dec_and_test(&rcu_barrier_cpu_count)) > - 4 complete(&rcu_barrier_completion); > + 3 if (atomic_dec_and_test(&rcu_barrier_cpu_count)) > + 4 complete(&rcu_barrier_completion); > 5 } > > -Quick Quiz #2: What happens if CPU 0's rcu_barrier_func() executes > +.. _rcubarrier_quiz_2: > + > +Quick Quiz #2: > + What happens if CPU 0's rcu_barrier_func() executes > immediately (thus incrementing rcu_barrier_cpu_count to the > value one), but the other CPU's rcu_barrier_func() invocations > are delayed for a full grace period? Couldn't this result in > rcu_barrier() returning prematurely? > > +:ref:`Answer to Quick Quiz #2 ` > + > The current rcu_barrier() implementation is more complex, due to the need > to avoid disturbing idle CPUs (especially on battery-powered systems) > and the need to minimally disturb non-idle CPUs in real-time systems. > @@ -269,6 +285,7 @@ However, the code above illustrates the concepts. > > > rcu_barrier() Summary > +--------------------- > > The rcu_barrier() primitive has seen relatively little use, since most > code using RCU is in the core kernel rather than in modules. However, if > @@ -277,8 +294,12 @@ so that your module may be safely unloaded. > > > Answers to Quick Quizzes > +------------------------ > + > +.. _answer_rcubarrier_quiz_1: > > -Quick Quiz #1: Is there any other situation where rcu_barrier() might > +Quick Quiz #1: > + Is there any other situation where rcu_barrier() might > be required? > > Answer: Interestingly enough, rcu_barrier() was not originally > @@ -292,7 +313,12 @@ Answer: Interestingly enough, rcu_barrier() was not originally > implementing rcutorture, and found that rcu_barrier() solves > this problem as well. > > -Quick Quiz #2: What happens if CPU 0's rcu_barrier_func() executes > +:ref:`Back to Quick Quiz #1 ` > + > +.. _answer_rcubarrier_quiz_2: > + > +Quick Quiz #2: > + What happens if CPU 0's rcu_barrier_func() executes > immediately (thus incrementing rcu_barrier_cpu_count to the > value one), but the other CPU's rcu_barrier_func() invocations > are delayed for a full grace period? Couldn't this result in > @@ -323,3 +349,5 @@ Answer: This cannot happen. The reason is that on_each_cpu() has its last > is to add an rcu_read_lock() before line 8 of rcu_barrier() > and an rcu_read_unlock() after line 8 of this same function. If > you can think of a better change, please let me know! > + > +:ref:`Back to Quick Quiz #2 ` >