Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2143218pxa; Mon, 24 Aug 2020 06:29:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2DCSteW/LYgb+oVZBZPev1U5pUW+XJNZQhrvJPiB7WSXOzmQ84Ln40resOcM1zoIAmosk X-Received: by 2002:aa7:d981:: with SMTP id u1mr5280590eds.311.1598275773326; Mon, 24 Aug 2020 06:29:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598275773; cv=none; d=google.com; s=arc-20160816; b=ljzv3b1iOVtwHKCzILsTFQkCBuAksIdYBZ3cFmn1kk7j5iYRkFr7yBYQq7s0K6jKy/ ODviB4qenGfqlM0eWHRkqdTCvgp7FeQZQOTNhFlF93jv8Uh18bePJrErs9hCRTTRu8zH /oRKl4XoGOIepFDM4z4K1gJQg9akJ6DktANv1mGhhWmFmwRsVbjkqapZJXZkhAIS5155 DieZ3s/ZkF1fd1qCRbrX3lX2slGcAQdUIG3vTGcLo5vZYIgfEOiNNLNpTkeTRYz7Mbq1 1DS3ibXcUlk9ajU0QGFFrIoYBCuszgBRLG+c4hZ0HN1u9UUxUoMGJM7Dzp3hUfwIt1ta X5oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=vnKsSiZRf5/gjhN7y0GjbeaLvwa1TXMfTe4FQo24CN4=; b=yKfDNEyv75MDOH0wIY5lR+ThEaebWHFD1y9HXlZIKraeP/TXnHh8xPEhuZHhS2Z4LU aWphmZdVdReViTT3Noqtses4mUsQzJVZN0eNU3xBO1hYoiXL2fPrm0trNQL/3HWYbGFG YHA2GHrXjFIe4HFFhsRFTIUTZUj00VFAwHxuwYIqm5798ygRmDnl1hJbeKDSTRHtIvLs YAcl09su587Rb+UL3pN7y9mZhSGT3EAXbKYWmDV5lrxtYDSXhxHa/gGXq9/ITwIqUJPx uoD8zYghGjb9U5j/9po7CHoMSM8YyyBe/7E7+QO4vL829KvoB2IMmVrTgLTtrY6WEQR2 BizQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ly14si7059035ejb.369.2020.08.24.06.29.09; Mon, 24 Aug 2020 06:29:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726041AbgHXN2f (ORCPT + 99 others); Mon, 24 Aug 2020 09:28:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:52384 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725780AbgHXN2e (ORCPT ); Mon, 24 Aug 2020 09:28:34 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EE44220838; Mon, 24 Aug 2020 13:28:30 +0000 (UTC) Date: Mon, 24 Aug 2020 09:28:28 -0400 From: Steven Rostedt To: David Laight Cc: 'Nicolas Boichat' , "dianders@chromium.org" , "groeck@chromium.org" , Andrew Morton , "Andy Shevchenko" , Daniel Vetter , "Guilherme G. Piccoli" , Kars Mulder , Kees Cook , Masahiro Yamada , Michal Marek , Thomas Gleixner , Tiezhu Yang , Will Deacon , Yue Hu , "linux-kbuild@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v5] kernel/trace: Add DISALLOW_TRACE_PRINTK make option Message-ID: <20200824092828.4386bd25@oasis.local.home> In-Reply-To: <3f84781f12424cbfa552981af42dfaf2@AcuMS.aculab.com> References: <20200824105852.v5.1.I4feb11d34ce7a0dd5ee2c3327fb5a1a9a646be30@changeid> <3f84781f12424cbfa552981af42dfaf2@AcuMS.aculab.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 24 Aug 2020 08:26:13 +0000 David Laight wrote: > Since the objective seems to be to ensure there are no > calls to trace_printk() in the git tree, but to allow > them in uncommitted sources. Why not use a config option > and rely on rand-config builds to detect any 'accidental' > commits? Because we don't want distros to ship with disallowing trace_printk, where someone finds a bug, sends the config to a developer, who then adds trace_printk() just to find that they can't use it. The point of avoiding a config was to keep the burden of having the developer needing it and having to then modify the config given to them. Also, it would then prevent those developing modules from using trace_printk() in their module if they build against one of these kernels. Finally, there's debug code in the kernel that legitimately uses trace_printk(), and those randconfigs will trigger on them. -- Steve