Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp685128ybl; Sat, 17 Aug 2019 08:30:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqxaiISR8kYQ+VTar07PELeH7bwAk+MI8L2r9bHUj/hmqw1yRfgAHjvXlrbYV0r3vuKy6m7M X-Received: by 2002:a17:90a:d082:: with SMTP id k2mr6562825pju.85.1566055838044; Sat, 17 Aug 2019 08:30:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566055838; cv=none; d=google.com; s=arc-20160816; b=zrL1MmUzGkYzLUi+bJ18DDz//R8zpd/dM0bL/MGVb/C7Tca99CcnzGF3PDrZ/t/6ZP VJBlsbOpSZ+X/iEMc4PZB0FpIobMyLPU+NlcpsbqUkceDwWJaE0DReJoHk/srEJeGJL0 /05xJV3H2JUifjBnpghYWKGdXN5thwtlHCadM9W3f+baNxZl42fRFLEmmJsvxnHDiugj GNt1cWIYKWZBprhY/0wA4Uh3iqhvx21N8Ff6yOpOS7ieH/2buEk7TXMhMw1LNIVzEnOz L7tp5hQ66eiavfqaMP8ubbvoIQuCfvt7moqggrIZh23hkTzXx3Og0hY2tNt9WCrrDV8h qbXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=/Y4LiuqRORy6PaPW9RSXeajoqysCzoA6Ar1ZBw1T9/g=; b=TXaU9KwYIxc9IV55VYy3zHcF830ZhiZvmBCpFEKd8jeh1jJ/FC+Gc16pFsfw5Ny7vt QVJaBJrMb03jcvlySqi8hG3QWbYDnuWJIozwlEqMM+uf/bu1nIFpZI5/JTo3u45Q/fpc f7ypDJETWLdKaN9w5UTbgPSy7bdjFS9UQFd4xc3sWy+so6xBufS6WPBqLqa8exHtJNMc 3ob8GnF/4EH1gLTcg1ZDHUMrqca2QQly17GyHQap3MqeFqHpYbATCEKVHM6QVlsYbVCX 3DISfhbzmBdtX8uKek6hRebZdjj+tWFxNNBTCwma08TqUOGt60c3WxtsZLg6L0LzQPXL KwSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w17si625881pjn.101.2019.08.17.08.29.38; Sat, 17 Aug 2019 08:30:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726002AbfHQP1A (ORCPT + 99 others); Sat, 17 Aug 2019 11:27:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:44756 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725925AbfHQP1A (ORCPT ); Sat, 17 Aug 2019 11:27:00 -0400 Received: from oasis.local.home (rrcs-76-79-140-27.west.biz.rr.com [76.79.140.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B1BBE21985; Sat, 17 Aug 2019 15:26:59 +0000 (UTC) Date: Sat, 17 Aug 2019 11:26:55 -0400 From: Steven Rostedt To: Mathieu Desnoyers Cc: Linus Torvalds , Thomas Gleixner , "Joel Fernandes, Google" , Alan Stern , Valentin Schneider , linux-kernel , Peter Zijlstra , paulmck , Boqun Feng , Will Deacon , David Howells Subject: Re: [PATCH 1/1] Fix: trace sched switch start/stop racy updates Message-ID: <20190817112655.2277a9c5@oasis.local.home> In-Reply-To: <39888715.23900.1566052831673.JavaMail.zimbra@efficios.com> References: <241506096.21688.1565977319832.JavaMail.zimbra@efficios.com> <1642847744.23403.1566005809759.JavaMail.zimbra@efficios.com> <20190816221313.4b05b876@oasis.local.home> <39888715.23900.1566052831673.JavaMail.zimbra@efficios.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 17 Aug 2019 10:40:31 -0400 (EDT) Mathieu Desnoyers wrote: > > I'm now even more against adding the READ_ONCE() or WRITE_ONCE(). > > I'm not convinced by your arguments. Prove to me that there's an issue here beyond theoretical analysis, then I'll consider that patch. Show me a compiler used to compile the kernel that zeros out the increment. Show me were the race actually occurs. I think the READ/WRITE_ONCE() is more confusing than helpful. And unneeded churn to the code. And really not needed for something that's not critical to execution. -- Steve