Return-Path: Received: from smtprelay0194.hostedemail.com ([216.40.44.194]:42162 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752022AbbFHRx4 (ORCPT ); Mon, 8 Jun 2015 13:53:56 -0400 Date: Mon, 8 Jun 2015 13:44:17 -0400 From: Steven Rostedt To: Petr Mladek Cc: Andrew Morton , Oleg Nesterov , Tejun Heo , Ingo Molnar , Peter Zijlstra , Richard Weinberger , David Woodhouse , linux-mtd@lists.infradead.org, Trond Myklebust , Anna Schumaker , linux-nfs@vger.kernel.org, Chris Mason , "Paul E. McKenney" , Thomas Gleixner , Linus Torvalds , Jiri Kosina , Borislav Petkov , Michal Hocko , live-patching@vger.kernel.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 15/18] ring_buffer: Allow to exit the ring buffer benchmark immediately Message-ID: <20150608134417.3fb7a811@gandalf.local.home> In-Reply-To: <1433516477-5153-16-git-send-email-pmladek@suse.cz> References: <1433516477-5153-1-git-send-email-pmladek@suse.cz> <1433516477-5153-16-git-send-email-pmladek@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-nfs-owner@vger.kernel.org List-ID: On Fri, 5 Jun 2015 17:01:14 +0200 Petr Mladek wrote: > It takes a while until the ring_buffer_benchmark module is removed > when the ring buffer hammer is running. It is because it takes > few seconds and kthread_should_terminate() is not being checked. > > This patch adds the check for kthread termination into the producer. > It uses the existing kill_test flag to finish the kthreads as > cleanly as possible. > > It disables printing the "ERROR" message when the kthread is going. > > Also it makes sure that producer does not go into the 10sec sleep > when it is being killed. This patch looks like something I may take regardless of the other patches (if it applies cleanly). As for the other patches, the ring buffer benchmark is just that, a benchmark that I use when making changes to the ring buffer. It's not something for production systems. What about just adding a depend on !LIVE_PATCHING to RING_BUFFER_BENCHMARK, or force it to shut down during patching. There's no reason to make it safe to be running when you patch the kernel. Just adds complexity to some simple code. -- Steve