Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp422175yba; Wed, 24 Apr 2019 03:43:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqzgug/erdXKeS5PhYtwK4QA3puXyf4jF4+rhjGe8VDMhF42Lw51Ex5Piskv5or98WzhlNJI X-Received: by 2002:a62:e10e:: with SMTP id q14mr15030611pfh.161.1556102628900; Wed, 24 Apr 2019 03:43:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556102628; cv=none; d=google.com; s=arc-20160816; b=QpUOWvpV9H4t7FCICPrK0hwHtroeu1T3HAzjqsOC9Wg2Me/UmQ7BdkT39kGsuOHwqc 9maeicLhlRJlf9j6t9XIwxELuVpQRDK3mnnjsIu25qCwX8K/yOYkH6NDaGXp+5RQyg4l e+K2TrPy5d2SuBER7+SVOKjswDF6SU/F8G3PrhveQVQg2Y1fc+C+C6zfruxAFRuOe3yZ 2mnAFPy6Gll3XEHkDwpx4gyUEITKi59ps1YSxNXPXrTXU1dBhWbXHpl5RSem9G7pKXhk TIgNSD705eU122KbQ3nZNhR/JUWfrqkTeeXmV11WpiO+7OKyJz0pyjSGIS/0zPNmBWVU OiVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=2DRGQMh4+98EOT5mkE2CxsSP4CPEFmdbGTQfHofQ8eI=; b=QjqS40yxUWOXttfqT3ejUzhA5LEo5jVZy3ytgvzhJpOT4AR8FbXbd4BXyhcR2lQHie 5rqjKDncSMqsTKb3wHg2/RL1eEIyfSCOtT/zGEOUhml+X2Plnf/lOUPoi7iELXdxFhH+ RdgWCuiTfrpS9N2BNG5HJ2BcDcNVJaFlPBNpT+nf+0xYSS8EOZb1yR45Ez8nQXJ6Rcyf /ejae7wJAFxx0Jd+b4slOZW8mbqD5dNoU2/vltDCMhQQoU8n9DJmuNu/Q7Gze0aybT8+ YXq4XCuU1QlS3PsKpFx4NeBgkudtcH+Dg0u0PzvUwxvqhxexlHXxW/v7gDmHnyiJgNqY lSHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="m/dNok4j"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m6si7584883pgd.78.2019.04.24.03.43.33; Wed, 24 Apr 2019 03:43:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="m/dNok4j"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728313AbfDXKlF (ORCPT + 99 others); Wed, 24 Apr 2019 06:41:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:40086 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726550AbfDXKlF (ORCPT ); Wed, 24 Apr 2019 06:41:05 -0400 Received: from pobox.suse.cz (prg-ext-pat.suse.com [213.151.95.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B3CD62084F; Wed, 24 Apr 2019 10:41:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556102464; bh=F3A71PrMdLdNdQbOEHMWMx2WAB5ZlMboAMxAGcWPPms=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=m/dNok4jUlWbd9Iq9jF0Vs+HcWQNHf7eUYWPd3IhDapP923nE/2AbVeMKMVmhjD7T IZboCOgXkCyFMfYXL68Ve7U6MrYO7Hm0lAt9KcajgAbbo/h5DpS++buY2XQYVqgn/A gim06cvPhpQhr8AHPXhd2agwt0cy6+iz23eOzRqM= Date: Wed, 24 Apr 2019 12:41:00 +0200 (CEST) From: Jiri Kosina To: Petr Mladek cc: Josh Poimboeuf , Miroslav Benes , Joe Lawrence , Kamalesh Babulal , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 3/3] livepatch: Cleanup message handling in klp_try_switch_task() In-Reply-To: <20190424085550.29612-4-pmladek@suse.com> Message-ID: References: <20190424085550.29612-1-pmladek@suse.com> <20190424085550.29612-4-pmladek@suse.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 24 Apr 2019, Petr Mladek wrote: > WARN_ON_ONCE() could not be called safely under rq lock because > of console deadlock issues. Fortunately, simple printk_deferred() > is enough because the warning is printed from a well defined > location and context. > > Also klp_try_switch_task() is called under klp_mutex. > Therefore, the buffer for debug messages could be static. > > Signed-off-by: Petr Mladek > --- > kernel/livepatch/transition.c | 19 ++++++++++++++----- > 1 file changed, 14 insertions(+), 5 deletions(-) > > diff --git a/kernel/livepatch/transition.c b/kernel/livepatch/transition.c > index 9c89ae8b337a..e8183d18227f 100644 > --- a/kernel/livepatch/transition.c > +++ b/kernel/livepatch/transition.c > @@ -254,6 +254,7 @@ static int klp_check_stack_func(struct klp_func *func, > static int klp_check_stack(struct task_struct *task, char *err_buf) > { > static unsigned long entries[MAX_STACK_ENTRIES]; > + static int enosys_warned; > struct stack_trace trace; > struct klp_object *obj; > struct klp_func *func; > @@ -263,8 +264,16 @@ static int klp_check_stack(struct task_struct *task, char *err_buf) > trace.nr_entries = 0; > trace.max_entries = MAX_STACK_ENTRIES; > trace.entries = entries; > + > ret = save_stack_trace_tsk_reliable(task, &trace); > - WARN_ON_ONCE(ret == -ENOSYS); > + if (ret == -ENOSYS) { > + if (!enosys_warned) { > + printk_deferred(KERN_WARNING "%s: save_stack_trace_tsk_reliable() not supported on this architecture.\n", > + __func__); > + enosys_warned = 1; ... abusing the fact that you are also printk maintainer :) ... looking at the above, wouldn't it make sense to introduce generic printk_deferred_once() instead? -- Jiri Kosina SUSE Labs