Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2001520ybb; Sun, 29 Mar 2020 19:36:35 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsTsB24Tus3oaDS/zWjXPfIOvc5dcvvhAZxEhyokzCampQTj+0j056C00cGARgQgKAzCi6/ X-Received: by 2002:a05:6808:6cb:: with SMTP id m11mr2064061oih.130.1585535795399; Sun, 29 Mar 2020 19:36:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585535795; cv=none; d=google.com; s=arc-20160816; b=KIHHJVQnvjHa/8jqn5pl7cbk/NTjQTTr2Nrzl91fi3Hm8e8zH9HiojebOgv9liYuzh YsWrdXwQuhShdwA/+Na1kue0Gj/rgTOB3QY7/iNjxGf7ZuGH8f+vXs7daXAsnZo/9Ad5 jFqeTedYziYWjmsH4kH51qxMS/7FhNSXRoW+ZCtirLA1ThHpTFb3mCN7DRMo0pCEhl39 J20YB+f2Z0/pD6OgjC7HUfo4XzcL+8dtH/xUGmHTEDEo/7W4tAW5lNcVNpX/0G/bn9xA OnUzCp9p0Jv3maxuecfSqbE8p47kJZWX5nxJMARPZF1ktSp6N2t1K2894VY1LSuTd+S+ XvMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Wx0JY2YKiW3y6xXQtIfMDOCqiN7fPBTCk6pvf651C60=; b=nknsrOtS64k0kIsUFIJMUlvV4nmCta/hrujBCeNpg/ykJGbUYmFT8gMukLfALTRIyw 133ind+MbnFaj/4QwM+tkmdAS5KEVP8sLSN7cqpMxOxaB8h48T1fseQ/eBTJ2vpZMNXo /d9yYlQNAGpeGGr/LNb2GpSe5k2uru8cqe/TUlG70fhjUvW/XJ5UI4fvG/dIFwIiyqfx dN/516wsUS4cwf5wVJT8OObt5N7TPTMTY5OhS3RZEPvsHrBfd2ER6J83pKS4jlVAoOho Tdxaecavn8bJUQ81yjAvKtItmUu+h5f6+aZF0Jag0UiaN3e/X7suIHA5/gigaADtG7Q2 8ukg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=x1VGsvdO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k27si5166909otf.40.2020.03.29.19.36.22; Sun, 29 Mar 2020 19:36:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=x1VGsvdO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729350AbgC3Cej (ORCPT + 99 others); Sun, 29 Mar 2020 22:34:39 -0400 Received: from mail-qt1-f196.google.com ([209.85.160.196]:45506 "EHLO mail-qt1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728901AbgC3Cdf (ORCPT ); Sun, 29 Mar 2020 22:33:35 -0400 Received: by mail-qt1-f196.google.com with SMTP id t17so13887408qtn.12 for ; Sun, 29 Mar 2020 19:33:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Wx0JY2YKiW3y6xXQtIfMDOCqiN7fPBTCk6pvf651C60=; b=x1VGsvdOgbW/pXh3K2fqEFIrtX7CGT8Kj9GkfUuhJ8X66LsZN584UWKXUs/dyaR6Uy rskvRF/ZZBYw63xgUm1Ivc2mBaaKNEoUxVmZK6nYp83mdBOhL3z+bR5+bMB7SLBVqF2H 5bdDD8rjYW1c5sAQfJh2fVXftxZB5W0S4KVZM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Wx0JY2YKiW3y6xXQtIfMDOCqiN7fPBTCk6pvf651C60=; b=auWk8U3aWk7D5J7n1Q6Vqxz4HqSpDjgbm0DVyKb8xlUg4O/6PkzXIhzIdjmdczbHcO dDtJPVTNp9t3vAG0ZisdyiYHUh8BK1Dy9MRdwEnES+TneXh+VD8v8nmAcbGgZc4mdgv3 rCzZE3SrT2sUxXsnluO+nFfYrzx5JZkTgpKdQGNLHVIxtCVx742TY6Ua7go/hEGpWzXe UJsMzS4xuQ4T/vvULKO1YI/MVLDi9lAWBN+k9wj1QHYbgpvgXQlgExCAlUvn0m0VG6gf Ns6yivQUbQ2kDk13VUYF8trVzieG0Hb59SBQQF62ToLPAQUev93vTw6yi5NSSXs936Fr alNw== X-Gm-Message-State: ANhLgQ3QHC6cn7QA9cR0b6HEIozlIUvkBGTxg/HqDjEkuIj6MbInr2/0 wjMwafyKxaqJY8rxLa4huUw0VTzTfyY= X-Received: by 2002:ac8:6f46:: with SMTP id n6mr9692172qtv.119.1585535614134; Sun, 29 Mar 2020 19:33:34 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id q15sm10030625qtj.83.2020.03.29.19.33.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 29 Mar 2020 19:33:33 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Cc: "Uladzislau Rezki (Sony)" , Joel Fernandes , Andrew Morton , Ingo Molnar , Josh Triplett , Lai Jiangshan , linux-mm@kvack.org, Mathieu Desnoyers , "Paul E. McKenney" , "Rafael J. Wysocki" , rcu@vger.kernel.org, Steven Rostedt Subject: [PATCH 03/18] rcu: Rename rcu_invoke_kfree_callback/rcu_kfree_callback Date: Sun, 29 Mar 2020 22:32:33 -0400 Message-Id: <20200330023248.164994-4-joel@joelfernandes.org> X-Mailer: git-send-email 2.26.0.rc2.310.g2932bb562d-goog In-Reply-To: <20200330023248.164994-1-joel@joelfernandes.org> References: <20200330023248.164994-1-joel@joelfernandes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Uladzislau Rezki (Sony)" Rename rcu_invoke_kfree_callback to rcu_invoke_kvfree_callback. Do the same with second trace event, that is rcu_kfree_callback, it becomes rcu_kvfree_callback. The reason is to be aligned with kvfree notation. Signed-off-by: Uladzislau Rezki (Sony) Reviewed-by: Joel Fernandes (Google) Signed-off-by: Joel Fernandes (Google) --- include/trace/events/rcu.h | 8 ++++---- kernel/rcu/tiny.c | 2 +- kernel/rcu/tree.c | 4 ++-- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/include/trace/events/rcu.h b/include/trace/events/rcu.h index f9a7811148e2a..0ee93d0b1daa8 100644 --- a/include/trace/events/rcu.h +++ b/include/trace/events/rcu.h @@ -506,13 +506,13 @@ TRACE_EVENT_RCU(rcu_callback, /* * Tracepoint for the registration of a single RCU callback of the special - * kfree() form. The first argument is the RCU type, the second argument + * kvfree() form. The first argument is the RCU type, the second argument * is a pointer to the RCU callback, the third argument is the offset * of the callback within the enclosing RCU-protected data structure, * the fourth argument is the number of lazy callbacks queued, and the * fifth argument is the total number of callbacks queued. */ -TRACE_EVENT_RCU(rcu_kfree_callback, +TRACE_EVENT_RCU(rcu_kvfree_callback, TP_PROTO(const char *rcuname, struct rcu_head *rhp, unsigned long offset, long qlen), @@ -596,12 +596,12 @@ TRACE_EVENT_RCU(rcu_invoke_callback, /* * Tracepoint for the invocation of a single RCU callback of the special - * kfree() form. The first argument is the RCU flavor, the second + * kvfree() form. The first argument is the RCU flavor, the second * argument is a pointer to the RCU callback, and the third argument * is the offset of the callback within the enclosing RCU-protected * data structure. */ -TRACE_EVENT_RCU(rcu_invoke_kfree_callback, +TRACE_EVENT_RCU(rcu_invoke_kvfree_callback, TP_PROTO(const char *rcuname, struct rcu_head *rhp, unsigned long offset), diff --git a/kernel/rcu/tiny.c b/kernel/rcu/tiny.c index 4b99f7b88beec..3dd8e6e207b09 100644 --- a/kernel/rcu/tiny.c +++ b/kernel/rcu/tiny.c @@ -86,7 +86,7 @@ static inline bool rcu_reclaim_tiny(struct rcu_head *head) rcu_lock_acquire(&rcu_callback_map); if (__is_kfree_rcu_offset(offset)) { - trace_rcu_invoke_kfree_callback("", head, offset); + trace_rcu_invoke_kvfree_callback("", head, offset); kvfree((void *)head - offset); rcu_lock_release(&rcu_callback_map); return true; diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c index 2d10c50621c38..88b744ce896c0 100644 --- a/kernel/rcu/tree.c +++ b/kernel/rcu/tree.c @@ -2744,7 +2744,7 @@ __call_rcu(struct rcu_head *head, rcu_callback_t func) // If no-CBs CPU gets here, rcu_nocb_try_bypass() acquired ->nocb_lock. rcu_segcblist_enqueue(&rdp->cblist, head); if (__is_kfree_rcu_offset((unsigned long)func)) - trace_rcu_kfree_callback(rcu_state.name, head, + trace_rcu_kvfree_callback(rcu_state.name, head, (unsigned long)func, rcu_segcblist_n_cbs(&rdp->cblist)); else @@ -2935,7 +2935,7 @@ static void kfree_rcu_work(struct work_struct *work) next = head->next; debug_rcu_head_unqueue(head); rcu_lock_acquire(&rcu_callback_map); - trace_rcu_invoke_kfree_callback(rcu_state.name, head, offset); + trace_rcu_invoke_kvfree_callback(rcu_state.name, head, offset); if (!WARN_ON_ONCE(!__is_kfree_rcu_offset(offset))) kvfree((void *)head - offset); -- 2.26.0.rc2.310.g2932bb562d-goog