Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3867089imw; Mon, 11 Jul 2022 18:14:59 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vEDphBX1E9QXvTT36S4S1v//+zJmzeARY+WFn7W1yXQ9Yl6FgxacXjTBCRIQ3bkUaWseoS X-Received: by 2002:a05:6402:2812:b0:43a:9041:d5db with SMTP id h18-20020a056402281200b0043a9041d5dbmr28018125ede.208.1657588498995; Mon, 11 Jul 2022 18:14:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657588498; cv=none; d=google.com; s=arc-20160816; b=shXtycR3GZnCFH3EeI4sDaH/AB+t9BSZlb2G2Bev3dfGZKi5a3BMXYJ0LJ5IHomc6q IDukCOVpuf89+zPd7UwU631Ygt5Bt1qzh93placAx3V6H13OBU34Y3/j0aeXM0yvbC6z XHd8VP0ao9T/BHMHmlhZaU8vTNgx4Dzjy0a18GodSOuzVQFAGgvD4OJBIyr0dLEefJk9 zXxnL/9LuMppM9HUjSOT1H9+XT+pi8DDgzdfIOC+cJJIKSmv++ER0IMvPw+hW5JcCIOB Tf48yK1JIOcxFC8/cadOTbVn4xTvPjZdT+AlkgP9yIiiith+yuXRhaJAucm+9vy7uHGQ UUSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=kV9iqX2gSHyWXOf1i9VGk3giFrxMPn2tysQ8Tp8BHZU=; b=sXFfbJstr2F1ODRL3IX9wp8Ea1XaE7BwMzxzjo+UMpFX57FyhDTVpcSLVvgHzNxCwc /GCBHGBwkiimdnwSYjFDpaR9X6AeM2BWL1Ge+VjaK9xq+7pd+WOMtDEnsSIWM0k0YzMN aPeKOBbdr5ui/HyZBw7c/o5m4t9qVxxkH2FUYehKYEPQRcie5ziFnsS2krYapgirLfdq TQFlmvRuMQbz2MCo1X9pyBIaAOh+Sg2JwMREUt/0TLHByfoV5aXvEWlwApggaJG6j5Nl 4C6DZg67VhYjDX4m1x4H/aVw4pXPJCVto34TFexDpEzwxVqJjwS2jrQ53sAK7UPgg+Nl eQng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lb2-20020a170907784200b0072a8a36c34esi10801829ejc.358.2022.07.11.18.14.34; Mon, 11 Jul 2022 18:14:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231135AbiGLAx0 (ORCPT + 99 others); Mon, 11 Jul 2022 20:53:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53116 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229616AbiGLAxZ (ORCPT ); Mon, 11 Jul 2022 20:53:25 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AE57627CC9 for ; Mon, 11 Jul 2022 17:53:24 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6DF76B81600 for ; Tue, 12 Jul 2022 00:53:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AFE8DC34115; Tue, 12 Jul 2022 00:53:20 +0000 (UTC) Date: Mon, 11 Jul 2022 20:53:19 -0400 From: Steven Rostedt To: "Paul E. McKenney" Cc: Marco Elver , John Ogness , Petr Mladek , Sergey Senozhatsky , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, Thomas Gleixner , Johannes Berg , Alexander Potapenko , Dmitry Vyukov , Naresh Kamboju , Linux Kernel Functional Testing Subject: Re: [PATCH -printk] printk, tracing: fix console tracepoint Message-ID: <20220711205319.1aa0d875@gandalf.local.home> In-Reply-To: <20220712002128.GQ1790663@paulmck-ThinkPad-P17-Gen-1> References: <20220503073844.4148944-1-elver@google.com> <20220711182918.338f000f@gandalf.local.home> <20220712002128.GQ1790663@paulmck-ThinkPad-P17-Gen-1> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 11 Jul 2022 17:21:28 -0700 "Paul E. McKenney" wrote: > On x86, both srcu_read_lock() and srcu_read_unlock() should be OK from > NMI context, give or take their use of lockdep. Which is why we have > srcu_read_lock_notrace() and srcu_read_unlock_notrace(), which do not > use lockdep. Which __DO_TRACE() does in fact invoke. Ah, but you have > this: "WARN_ON_ONCE(rcuidle && in_nmi())". > > Because all the world is not an x86. But since NMIs are architecture specific, we could change that to: WARN_ON_ONCE(!srcu_nmi_safe && rcuidle && in_nmi()); and add a srcu_nmi_safe constant or macro that is 1 on architectures that srcu is safe in NMI and 0 otherwise. Or do we care if a tracepoint happens in those architectures where it is not safe. We could then just do: if (!srcu_nmi_safe && rcuidle && in_nmi()) return; and just skip tracepoints that are marked rcu_idle and happen within NMI. -- Steve