Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966181AbbFJPyf (ORCPT ); Wed, 10 Jun 2015 11:54:35 -0400 Received: from smtprelay0066.hostedemail.com ([216.40.44.66]:49533 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S964890AbbFJPyP (ORCPT ); Wed, 10 Jun 2015 11:54:15 -0400 X-Session-Marker: 726F737465647440676F6F646D69732E6F7267 X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,rostedt@goodmis.org,:::::::::::::,RULES_HIT:41:355:379:541:599:800:960:973:988:989:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1534:1539:1593:1594:1711:1714:1730:1747:1777:1792:2194:2199:2393:2553:2559:2562:3138:3139:3140:3141:3142:3351:3622:3865:3866:3867:3868:3870:3871:3872:3874:4250:4321:5007:6261:7875:10004:10400:10848:10967:11026:11232:11473:11658:11914:12438:12517:12519:12555:12740:13069:13311:13357:21080,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fn,MSBL:0,DNSBL:none,Custom_rules:0:0:0 X-HE-Tag: glove81_5f1549d91f863 X-Filterd-Recvd-Size: 1747 Date: Wed, 10 Jun 2015 11:54:11 -0400 From: Steven Rostedt To: Peter Zijlstra Cc: Petr Mladek , linux-kernel@vger.kernel.org, jkosina@suse.cz, paulmck@linux.vnet.ibm.com, Ingo Molnar , Thomas Gleixner Subject: Re: [RFC][PATCH] printk: Fixup the nmi printk mess Message-ID: <20150610115411.2b9184aa@gandalf.local.home> In-Reply-To: <20150610153253.GJ3644@twins.programming.kicks-ass.net> References: <20150610125509.GO19282@twins.programming.kicks-ass.net> <20150610143155.GD9409@pathway.suse.cz> <20150610145737.GE9409@pathway.suse.cz> <20150610153253.GJ3644@twins.programming.kicks-ass.net> X-Mailer: Claws Mail 3.11.1 (GTK+ 2.24.25; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 879 Lines: 21 On Wed, 10 Jun 2015 17:32:53 +0200 Peter Zijlstra wrote: > > Note that the backtraces used to be serialized via > > static arch_spinlock_t lock = __ARCH_SPIN_LOCK_UNLOCKED > > in the past. See the commit > > a9edc8809328 ("x86/nmi: Perform a safe NMI stack trace on all CPUs") > > We could easily add a static raw_spinlock_t to __printk_nmi_flush() and > serialize its invocations if people think that is important. Yes please. One thing about the original change is that it made the NMI backtraces readable. I hated the interleaving of the backtraces, as it made it almost impossible to to debug. -- Steve -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/