From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755494AbcJ1Daw (ORCPT ); Thu, 27 Oct 2016 23:30:52 -0400 Received: from mail-oi0-f67.google.com ([209.85.218.67]:35287 "EHLO mail-oi0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755291AbcJ1Dav (ORCPT ); Thu, 27 Oct 2016 23:30:51 -0400 MIME-Version: 1.0 In-Reply-To: <20161027154933.1211-1-sergey.senozhatsky@gmail.com> References: <20161027154933.1211-1-sergey.senozhatsky@gmail.com> From: Linus Torvalds Date: Thu, 27 Oct 2016 20:30:50 -0700 X-Google-Sender-Auth: PBaapy-5n888NTFXNedLXmjWkak Message-ID: Subject: Re: [RFC][PATCHv4 0/6] printk: use printk_safe to handle printk() recursive calls To: Sergey Senozhatsky Cc: Petr Mladek , Andrew Morton , Jan Kara , Tejun Heo , Calvin Owens , Thomas Gleixner , Mel Gorman , Steven Rostedt , Ingo Molnar , Peter Zijlstra , Laura Abbott , Andy Lutomirski , Kees Cook , Linux Kernel Mailing List , Sergey Senozhatsky Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 27, 2016 at 8:49 AM, Sergey Senozhatsky wrote: > > RFC > > This patch set extends a lock-less NMI per-cpu buffers idea to > handle recursive printk() calls. The basic mechanism is pretty much the > same -- at the beginning of a deadlock-prone section we switch to lock-less > printk callback, and return back to a default printk implementation at the > end; the messages are getting flushed to a logbuf buffer from a safer > context. This looks very reasonable to me. Does this also obviate the need for "printk_deferred()" that the scheduler and the clock code uses? Because that would be a lovely thing to look at if it doesn't.. LInus