Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1717947pxa; Thu, 20 Aug 2020 19:46:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxIdcw+Mu6FPTy5IDhdkfYZ3cUh4SPmfe1Z/krPIl8rPQDKYrPjSyizqGFTFIHGEIAfKPcr X-Received: by 2002:a50:f10c:: with SMTP id w12mr843708edl.202.1597978013057; Thu, 20 Aug 2020 19:46:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597978013; cv=none; d=google.com; s=arc-20160816; b=sIgXNUDyOYkN+W9eozCM+TTWrTZdhaYTdS2gXSE54dh8ifln/jR6qAzTKQXl+u8E4A U1H+9sQit/wGsUpP3dsjEYTG+AFPwIhjZpycI3RIJwwX3afrq7zaak0M8b75Z9lmRg19 7pqvhUbeuED8Nrq2i2gJWK2o1BRO5M3qE015mOW+weDTuG0a5xwzfMzANVUgjnoUIBOr k4aw9RRt7MlN/p5IVjr+ZozQf1kakPZUwBJC3STG9SUSuMVHWMwOhvNQmG35Ap4hej/5 Pvp/+WF6gsDbG5lSvtIdafQM30SXfaWx/WqXlKcAKIkWD1qvuu/7LBuw1PdrYArncL3E JntA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=NShzenoKLmheNSNbmXQur0ggr++bz2gTDSMx/4fbY24=; b=Nmi4Qm8OFG7j/vAWBQbvuscQIyl+A6Tz4DMYZA14OVVft6YyONQwxwlnV7llrMYHYd kqIRSRw7b/p/ZDWoQTB8GaWTN2VHQClqyuwpZUq4RyqvESEotNBWozgqr4Iz2vPOMPZm 5rZsLkm+Bq/FN8Xj5Ebj1cJDK5F3sb2eseR6QMNVvSZJbPbw05cw0C2PGsxYdR3QoKCv SMiPnYgRh3X2/FWJLZXnZDipAY/SmfvTPk/3pd+s8tY+QQCtksBpM7fnTVPoWvQiaW9m ag5N9Nxd1QypnuW5IwqTCZMoyCFdAfXZGmqFt9OoQUUlorxKVQcjFXubJPhIxw9dCEvS XHiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo27si320172edb.0.2020.08.20.19.46.29; Thu, 20 Aug 2020 19:46:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727075AbgHUCpD (ORCPT + 99 others); Thu, 20 Aug 2020 22:45:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:53294 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726840AbgHUCpC (ORCPT ); Thu, 20 Aug 2020 22:45:02 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D94B20758; Fri, 21 Aug 2020 02:45:00 +0000 (UTC) Date: Thu, 20 Aug 2020 22:44:59 -0400 From: Steven Rostedt To: Joe Perches Cc: Nicolas Boichat , Mauro Carvalho Chehab , Greg Kroah-Hartman , Andy Shevchenko , Sakari Ailus , devel@driverdev.osuosl.org, lkml , Linux Media Mailing List , Peter Zijlstra , Thomas Gleixner , Josh Poimboeuf , Douglas Anderson , Guenter Roeck Subject: Re: [PATCH v4 3/3] media: atomisp: Only use trace_printk if allowed Message-ID: <20200820224459.0968b9f4@oasis.local.home> In-Reply-To: References: <20200820170951.v4.1.Ia54fe801f246a0b0aee36fb1f3bfb0922a8842b0@changeid> <20200820170951.v4.3.I066d89f39023956c47fb0a42edf196b3950ffbf7@changeid> <20200820102347.15d2f610@oasis.local.home> <20200820203601.4f70bf98@oasis.local.home> <20200820215701.667f02b2@oasis.local.home> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 20 Aug 2020 19:36:19 -0700 Joe Perches wrote: > On Thu, 2020-08-20 at 21:57 -0400, Steven Rostedt wrote: > > On Fri, 21 Aug 2020 09:39:19 +0800 > > Nicolas Boichat wrote: > [] > > > Some other approaches/ideas: > > > 1. Filter all lkml messages that contain trace_printk. Already found > > > 1 instance, and I can easily reply to those with a semi-canned answer, > > > if I remember to check that filter regularly (not sustainable in the > > > long run...). > > > > Added Joe Perches to the thread. > > > > We can update checkpatch.pl to complain about a trace_printk() that it > > finds in the added code. > > Why? > > I don't see much value in a trace_printk checkpatch warning. > tracing is still dependent on CONFIG_TRACING otherwise > trace_printk is an if (0) > > ELI5 please. > Because no production code should contain trace_printk(). It should be deleted before going to Linus. If you have trace_printk() in your code, you will be greeted by the following banner in your dmesg: ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ********************************************************** -- Steve