From patchwork Thu Jun 28 12:33:47 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Rutland X-Patchwork-Id: 140436 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp2128532ljj; Thu, 28 Jun 2018 05:34:05 -0700 (PDT) X-Google-Smtp-Source: AAOMgpf47hmMPSXVLE8xPpbbO2TmxrViRFZj2vHZQoToXlJJUEwzeM43CPPAenFIgN7ChYDzZ6ce X-Received: by 2002:a62:8a83:: with SMTP id o3-v6mr10081964pfk.12.1530189244891; Thu, 28 Jun 2018 05:34:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530189244; cv=none; d=google.com; s=arc-20160816; b=VVCmrHYD280ajJpwPYrRmmmih4u7DyFz4x1LUFknI6erD/0FUO5qlfdTHhlx1Mtte6 QlIsGA+wOXQhFAUxBwPW9RgycsNhic93wyVmVLZEI4Z7hN0jjJ8bo2HoUyUzHsRBZmML Ll1bzuEkMwKuPji3E5I5SPDiX6vZagp6CSk1oqSO9gy9AE5w1LFlDKye73Q3xZissKap RttoIFms/ZH6UWANvHOgtuBVyzvE2qVN9djqnDuhAMJsA+6WsSAXpoc7d5BdlXrfnGwt VSItx7u1WUJ1nI2u7v107MBIU15gHd8Iwyhc1esN9GQw9WLYLgDgeOLgKtugSVEEuChS SgiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=OqhNMsb50bqNFjqShDJDKY8KWLJf3D2g6D7c+genLqQ=; b=edeaXvVZd0yJS5lZyUKoKyVqtxoMJuUJ9fAjTlxaNRkirc0eKXdytrFpTxGF/WTkjQ CIeKwuZpMzJgf1B2Wr3c1pWxLlTR/uWD4n3x99jXrIXgRL5uztcHTPU+wKJRdCeXW/Im XIjbx8NE12hAGaWRZhdLU4sQYJZ2Jse3P2UGQF/jdpG2B4EBmJJaaw7ievqDW3TCWGTC J1ef1kZEKQhaGro59+S6P0mG7cAe4KHq33Ce7134DOxNMsGiOK+gZ8rs1kMB8IdTUWS3 +N8UQ0mo1rrFs20qUhsYHQSpy8bXaKROQhn9cfh5dEdLvN3VvPERXHynFD/F/oxghvsS gTqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m12-v6si6703754pfd.348.2018.06.28.05.34.04; Thu, 28 Jun 2018 05:34:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753777AbeF1MeD (ORCPT + 31 others); Thu, 28 Jun 2018 08:34:03 -0400 Received: from foss.arm.com ([217.140.101.70]:46694 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753714AbeF1MeA (ORCPT ); Thu, 28 Jun 2018 08:34:00 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F241C15AD; Thu, 28 Jun 2018 05:33:59 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id BE9133F5C0; Thu, 28 Jun 2018 05:33:57 -0700 (PDT) From: Mark Rutland To: linux-kernel@vger.kernel.org Cc: akiyks@gmail.com, andrea.parri@amarulasolutions.com, boqun.feng@gmail.com, dhowells@redhat.com, j.alglave@ucl.ac.uk, luc.maranget@inria.fr, mark.rutland@arm.com, npiggin@gmail.com, paulmck@linux.vnet.ibm.com, peterz@infradead.org, stern@rowland.harvard.edu, will.deacon@arm.com Subject: [PATCH 2/2] tools/memory-model: remove ACCESS_ONCE() from model Date: Thu, 28 Jun 2018 13:33:47 +0100 Message-Id: <20180628123347.52963-3-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20180628123347.52963-1-mark.rutland@arm.com> References: <20180628123347.52963-1-mark.rutland@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since commit: b899a850431e2dd0 ("compiler.h: Remove ACCESS_ONCE()") ... there has been no definition of ACCESS_ONCE() in the kernel tree, and it has been necessary to use READ_ONCE() or WRITE_ONCE() instead. Correspondingly, let's remove ACCESS_ONCE() from the kernel memory model. Signed-off-by: Mark Rutland Cc: Alan Stern Cc: Andrea Parri Cc: Will Deacon Cc: Peter Zijlstra Cc: Boqun Feng Cc: Nicholas Piggin Cc: David Howells Cc: Jade Alglave Cc: Luc Maranget Cc: Paul E. McKenney Cc: Akira Yokosawa --- tools/memory-model/linux-kernel.bell | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 2.11.0 diff --git a/tools/memory-model/linux-kernel.bell b/tools/memory-model/linux-kernel.bell index 64f5740e0e75..b84fb2f67109 100644 --- a/tools/memory-model/linux-kernel.bell +++ b/tools/memory-model/linux-kernel.bell @@ -13,7 +13,7 @@ "Linux-kernel memory consistency model" -enum Accesses = 'once (*READ_ONCE,WRITE_ONCE,ACCESS_ONCE*) || +enum Accesses = 'once (*READ_ONCE,WRITE_ONCE*) || 'release (*smp_store_release*) || 'acquire (*smp_load_acquire*) || 'noreturn (* R of non-return RMW *)