Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3693006imm; Mon, 18 Jun 2018 02:25:09 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIj1F+CRGBXfYFgsxrjmG4LSV3Mfn110GmPeT0UbEmNoq1RFEu2pFU4LQ1gr4e2rmbXvG2J X-Received: by 2002:a17:902:6bc7:: with SMTP id m7-v6mr13453135plt.162.1529313909169; Mon, 18 Jun 2018 02:25:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529313909; cv=none; d=google.com; s=arc-20160816; b=bW+YEBHOIIdNiZTt3SUnIHa5RcJToVmPzLP5WNNnoMTmfwIUg1RpWcV4+6s9UC3vdq vkbzNUtNlul/7mzxAM1hyvf8niT6ZG4Mg88hmdfpBAHoXeiGzfPoSCvOHJvojzgexNMw MMoXthOjYwXejS6kXa7x63b8yvgPY68igZnAdVDX5Hix8TnxlyLKvaUcd0WGjoyG/byh xRAH605erfpJM8tlTtH6ilKQbs/ZLXhT6mQrgb+Z2x2v6JWXjTmPvs4TV3/NVXJkjAa/ Aw4bwU7t9Gftr8M1uEgf4C0y5TGOX9O2vPPheHCt2wBR84q6N9hEDKg0/Qq4V+PISu2J /PEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=mfJWrr2cJyRPGsGFSlnXaK5x/Wof/C3RQRtL55yf09k=; b=ouMeIZH5u73Mb7fO1smzPsPG0fdEopSXzS2gj2LrWQ7mowEDXR6K2i7QCB+T/e3crI qdbTiAF2g1PP5UluH1eX7xcRsdTReaSf6A5cBZ6Zof5AU6VJHmqDkeTqeaHKCxyvmyD9 pcc+qoG1vndGYP9tLR9JJ+907itqm9WWiKEMLwqeYqtkaS3sO9dqeiVJZkR9fdT+ClcP 636387ZcbeiNXCppq3cOMxrGvfwsWIozqdxH65GdDTGpEqP02gyMrp09lyvyZWfWIepV IFbCfC2WjJGCbttbaD8rDsC+n2MRVPg11AFhSPBqpeEZiUX4tO/+rNFC8GewZYzeqWcy WMIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t1-v6si13992812plq.280.2018.06.18.02.24.55; Mon, 18 Jun 2018 02:25:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966397AbeFRJYV (ORCPT + 99 others); Mon, 18 Jun 2018 05:24:21 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:57486 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966293AbeFRI0y (ORCPT ); Mon, 18 Jun 2018 04:26:54 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B87E3C7A; Mon, 18 Jun 2018 08:26:53 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dave Hansen , Andrew Morton , Dave Hansen , Linus Torvalds , Michael Ellermen , Peter Zijlstra , Ram Pai , Shuah Khan , Thomas Gleixner , linux-mm@kvack.org, Ingo Molnar , Sasha Levin Subject: [PATCH 4.16 240/279] x86/pkeys/selftests: Avoid printf-in-signal deadlocks Date: Mon, 18 Jun 2018 10:13:45 +0200 Message-Id: <20180618080618.719688426@linuxfoundation.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180618080608.851973560@linuxfoundation.org> References: <20180618080608.851973560@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dave Hansen [ Upstream commit caf9eb6b4c82fc6cbd03697052ff22d97b0c377b ] printf() and friends are unusable in signal handlers. They deadlock. The pkey selftest does not do any normal printing in signal handlers, only extra debugging. So, just print the format string so we get *some* output when debugging. Signed-off-by: Dave Hansen Cc: Andrew Morton Cc: Dave Hansen Cc: Linus Torvalds Cc: Michael Ellermen Cc: Peter Zijlstra Cc: Ram Pai Cc: Shuah Khan Cc: Thomas Gleixner Cc: linux-mm@kvack.org Link: http://lkml.kernel.org/r/20180509171344.C53FD2F3@viggo.jf.intel.com Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- tools/testing/selftests/x86/pkey-helpers.h | 20 ++++++++------------ 1 file changed, 8 insertions(+), 12 deletions(-) --- a/tools/testing/selftests/x86/pkey-helpers.h +++ b/tools/testing/selftests/x86/pkey-helpers.h @@ -26,30 +26,26 @@ static inline void sigsafe_printf(const { va_list ap; - va_start(ap, format); if (!dprint_in_signal) { + va_start(ap, format); vprintf(format, ap); + va_end(ap); } else { int ret; - int len = vsnprintf(dprint_in_signal_buffer, - DPRINT_IN_SIGNAL_BUF_SIZE, - format, ap); /* - * len is amount that would have been printed, - * but actual write is truncated at BUF_SIZE. + * No printf() functions are signal-safe. + * They deadlock easily. Write the format + * string to get some output, even if + * incomplete. */ - if (len > DPRINT_IN_SIGNAL_BUF_SIZE) - len = DPRINT_IN_SIGNAL_BUF_SIZE; - ret = write(1, dprint_in_signal_buffer, len); + ret = write(1, format, strlen(format)); if (ret < 0) - abort(); + exit(1); } - va_end(ap); } #define dprintf_level(level, args...) do { \ if (level <= DEBUG_LEVEL) \ sigsafe_printf(args); \ - fflush(NULL); \ } while (0) #define dprintf0(args...) dprintf_level(0, args) #define dprintf1(args...) dprintf_level(1, args)