Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp1762890pxt; Sun, 8 Aug 2021 00:24:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHPmJbslWRyOoFy13lzvPJGEZEgIiq1UA5/umKm6+JuANbj+LeFYSR5c8fH+RiBhH+nTzy X-Received: by 2002:a05:6602:2e11:: with SMTP id o17mr277169iow.55.1628407446521; Sun, 08 Aug 2021 00:24:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628407446; cv=none; d=google.com; s=arc-20160816; b=0Fy83lWQG87HPws9T028XumQwHRyO3plFONPP8WUchxi5IxlLoskSyN/xraF5bkp+Q L6Ry4c7Ztkr+9l2kyVvUzWHejpvhB1acNT/SZDrCBLrjCujNnYLPTXdqv1xzIDmvnI4b xDquje5lPLfws7x+WKFfyC1ceNPmCdywxx6Swk5X+bFDoz45m5T29pw8OhlG/GVRcv5E I4t559hqraYQyavTDA1hehClP3R1xwLG6fZMKpmX2SHyuAdGiO3d5y7diha3v2li8mpe 8P/Ey8jH0jvlbzyTi92YzctJSU7fRkRcCnR7v008cvao0McyIWrd5HNtNPQm+CuTa/lT Sa1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=d8kDEG2r/qULk1tKo4sJ28glC5EeZ2ocwBofsW+U2cA=; b=mU4zh0p9J8H/5R4j/9MSFcn8HfcvWIaiGxsZsG3O+pOHDOBAbZf2eYfSG5UqQ2SfqQ QapWIL0Kelm9ThBbqZ9Zy2XcDsMkwBpqTWu5l4fNbwIrQcDInGCd4iqPtE0jWxMAj0il ZsnYHstkrJxbrE0LsyaCpUOb86OzqipYxZRkbo4Zm7UfgkRCoz28WYquLYu9qf/1yNwM 2LyiDBdOKrT0D5Ydl9ge61+OgJ87Ejmul1UjMm62rTyP+mMv6HbgkiH6Ue0mFibjyHpj i7chJywcRHYgTlW4Lu9r8pbAmZHJ+R/7lrxle3G4vrK75Zj7iD74OMlD2lp9RjVcxUHv 6aGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uQ+6c+w8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g2si19224661ioo.75.2021.08.08.00.23.55; Sun, 08 Aug 2021 00:24:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uQ+6c+w8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231348AbhHHHXW (ORCPT + 99 others); Sun, 8 Aug 2021 03:23:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:54944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230492AbhHHHXT (ORCPT ); Sun, 8 Aug 2021 03:23:19 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 62A6160C40; Sun, 8 Aug 2021 07:22:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1628407379; bh=uhLAo5FfyVe5NiACB2W/CyEoXjolokTW49NauGIkC0w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uQ+6c+w8KrSmz/WDTHGYr/YENGI2CdfxWr+Ow+EMbqp/QfdYFuLnDze2wHox7yNAx umnnxmvFcIvpzxT3i+Ov316Hg+kng6MiIX9iWv6M776hC0VNs087TrS7MB1k4wDoY5 vnzbV7lUEDIXucG7JUfqvWe8JcXFy2yntGvrjYnM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Eric W. Biederman" , Anna-Maria Gleixner , Thomas Gleixner , "Paul E. McKenney" , bigeasy@linutronix.de, Zhen Lei , Joe Korty Subject: [PATCH 4.4 11/11] rcu: Update documentation of rcu_read_unlock() Date: Sun, 8 Aug 2021 09:22:46 +0200 Message-Id: <20210808072217.704630357@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210808072217.322468704@linuxfoundation.org> References: <20210808072217.322468704@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anna-Maria Gleixner [ Upstream commit ec84b27f9b3b569f9235413d1945a2006b97b0aa ] Since commit b4abf91047cf ("rtmutex: Make wait_lock irq safe") the explanation in rcu_read_unlock() documentation about irq unsafe rtmutex wait_lock is no longer valid. Remove it to prevent kernel developers reading the documentation to rely on it. Suggested-by: Eric W. Biederman Signed-off-by: Anna-Maria Gleixner Signed-off-by: Thomas Gleixner Reviewed-by: Paul E. McKenney Acked-by: "Eric W. Biederman" Cc: bigeasy@linutronix.de Link: https://lkml.kernel.org/r/20180525090507.22248-2-anna-maria@linutronix.de Signed-off-by: Zhen Lei Acked-by: Joe Korty Signed-off-by: Greg Kroah-Hartman --- include/linux/rcupdate.h | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/include/linux/rcupdate.h +++ b/include/linux/rcupdate.h @@ -880,9 +880,7 @@ static __always_inline void rcu_read_loc * Unfortunately, this function acquires the scheduler's runqueue and * priority-inheritance spinlocks. This means that deadlock could result * if the caller of rcu_read_unlock() already holds one of these locks or - * any lock that is ever acquired while holding them; or any lock which - * can be taken from interrupt context because rcu_boost()->rt_mutex_lock() - * does not disable irqs while taking ->wait_lock. + * any lock that is ever acquired while holding them. * * That said, RCU readers are never priority boosted unless they were * preempted. Therefore, one way to avoid deadlock is to make sure