From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753325AbdL1KGb (ORCPT ); Thu, 28 Dec 2017 05:06:31 -0500 Received: from mail-pg0-f50.google.com ([74.125.83.50]:40431 "EHLO mail-pg0-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752954AbdL1KG3 (ORCPT ); Thu, 28 Dec 2017 05:06:29 -0500 X-Google-Smtp-Source: ACJfBoslDO6EXCgmBWiueDJglj/1UCApGth0cOcOK+MC0J2fxK61aU7MCTDrQWEhN8gkwHhc/pW6Ew== Date: Thu, 28 Dec 2017 19:07:08 +0900 From: Sergey Senozhatsky To: Sergey Senozhatsky Cc: Steven Rostedt , Tejun Heo , Petr Mladek , Sergey Senozhatsky , Jan Kara , Andrew Morton , Peter Zijlstra , Rafael Wysocki , Pavel Machek , Tetsuo Handa , linux-kernel@vger.kernel.org Subject: Re: [RFC][PATCHv6 00/12] printk: introduce printing kernel thread Message-ID: <20171228100708.GB892@jagdpanzerIV> References: <20171204134825.7822-1-sergey.senozhatsky@gmail.com> <20171214142709.trgl76hbcdwaczzd@pathway.suse.cz> <20171214152551.GY3919388@devbig577.frc2.facebook.com> <20171214125506.52a7e5fa@gandalf.local.home> <20171214181153.GZ3919388@devbig577.frc2.facebook.com> <20171214132109.32ae6a74@gandalf.local.home> <20171222000932.GG1084507@devbig577.frc2.facebook.com> <20171221231932.27727fab@vmware.local.home> <20171228064858.GA892@jagdpanzerIV> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171228064858.GA892@jagdpanzerIV> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On (12/28/17 15:48), Sergey Senozhatsky wrote: [..] > and I'm actually thinking about returning back the old vprintk_emit() > behavior > > vprintk_emit() > { > + preempt_disable(); > if (console_trylock()) > console_unlock(); > + preempt_enable(); > } but am not going to. it's outside of printk_kthread scope. and, besides, not every CPU which is looping on console_unlock() came there via printk(). so by disabling preemption in console_unlock() we cover more cases. -ss