Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp722852imm; Wed, 20 Jun 2018 05:43:01 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJVQ3y497Pbev2OOOXwalYal4EKInR3L8XM2+aF5rlTR+gD/6nBoGF3Bq375bC/LtzPjCM+ X-Received: by 2002:a17:902:760d:: with SMTP id k13-v6mr23227135pll.56.1529498581396; Wed, 20 Jun 2018 05:43:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529498581; cv=none; d=google.com; s=arc-20160816; b=znriJVZKTXNRIQn1UbVDmKgm/2Ny8q4vEXrZ9rHL+5HNuMLKyVWSrBXzkUvtueaoVP sWyDwY22rBiuSElecMbngkDhS+gujaSZn35OIsirQWjg7dGVKfOAJgjxdcixFsgf4PT9 Pdgpoy3qnX0s41eO3faY9HI9CvD/ShH2pZYZneOtwrjHwF9tu1Dj+V8iMAdLDmPjhUUo TIFijni+g0Q59VlFZwmpkvcXqZh1dMH43rEQpNo5LWquxW1+SU8Cj8rnf+G+61+uE1GS DL4EMXXRopNAxoYuE1vm2aMsV/QhubOTjlt6wBy6GCjEvrYzGOd7n8T7QF30BFKn0nHP X36A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=prHxxC8tO/AxaTs/XTNYtvQ9XPpiTybFk5ErSZTJPbE=; b=BacvX0cHYpeVcDzBOhZhqahZ+sOJmJaBDwv+6FtdDj4YtH//wl9MwOV9jRwXbxr+eH Hh6gvvglHlTdnUjJEPksST5eX/3wmaIm1/Vy7aLZPVEQvJeRfokvG8zwmmo+rTIycMoN I56xbjOBC513MHqL9hqQdLI60GeivarY60SMxtRW2EHwo1+dykmcLtm/17cjxeR9Pxx7 PrlYcG5pw0K10tLiKP+QyJKA3iZxHG7egfil0HEqm80OIkDoG7ctGtsEDeBnAyReor/J ju6PtQZqnKo520SbGDx8mjflSg5A92dtCiFwFa3ddUVFv5TuAxi31v1HuyQZL8JfSe7K BgGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5-v6si1874414pgq.669.2018.06.20.05.42.46; Wed, 20 Jun 2018 05:43:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752951AbeFTMmG (ORCPT + 99 others); Wed, 20 Jun 2018 08:42:06 -0400 Received: from mga07.intel.com ([134.134.136.100]:46425 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751340AbeFTMmF (ORCPT ); Wed, 20 Jun 2018 08:42:05 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Jun 2018 05:42:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.51,247,1526367600"; d="scan'208";a="58808372" Received: from dengy1x-mobl1.ccr.corp.intel.com (HELO wfg-t570.sh.intel.com) ([10.254.213.248]) by FMSMGA003.fm.intel.com with ESMTP; 20 Jun 2018 05:41:57 -0700 Received: from wfg by wfg-t570.sh.intel.com with local (Exim 4.89) (envelope-from ) id 1fVcQv-0001YD-88; Wed, 20 Jun 2018 20:41:57 +0800 Date: Wed, 20 Jun 2018 20:41:57 +0800 From: Fengguang Wu To: Dmitry Vyukov Cc: Sergey Senozhatsky , Petr Mladek , Tetsuo Handa , Sergey Senozhatsky , syzkaller , Steven Rostedt , LKML , Linus Torvalds , Andrew Morton Subject: Re: [PATCH] printk: inject caller information into the body of message Message-ID: <20180620124157.gd5245o63dq6teul@wfg-t540p.sh.intel.com> References: <20180518121506.wilixxkznbtskw34@pathway.suse.cz> <20180524021451.GA23443@jagdpanzerIV> <20180620083126.GA477@jagdpanzerIV> <20180620090413.GA444@jagdpanzerIV> <20180620113731.y7apmqoh6ke6ar2v@wfg-t540p.sh.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 20, 2018 at 02:31:51PM +0200, Dmitry Vyukov wrote: >On Wed, Jun 20, 2018 at 1:37 PM, Fengguang Wu wrote: >> On Wed, Jun 20, 2018 at 11:30:05AM +0200, Dmitry Vyukov wrote: >>> >>> On Wed, Jun 20, 2018 at 11:06 AM, Sergey Senozhatsky >>> wrote: >>>> >>>> Hi Dmitry, >>>> >>>> On (06/20/18 10:45), Dmitry Vyukov wrote: >>>>> >>>>> Hi Sergey, >>>>> >>>>> What are the visible differences between this patch and Tetsuo's >>>>> patch? >>>> >>>> >>>> I guess none, and looking at your requirements below I tend to agree >>>> that Tetsuo's approach is probably what you need at the end of the day. >>>> >>>>> The only thing that will matter for syzkaller parsing in the >>>>> end is the resulting text format as it appears on console. But you say >>>>> "I'm not pushing for this particular message format", so what exactly >>>>> do you want me to provide feedback on? >>>>> I guess we need to handle pr_cont properly whatever approach we take. >>>> >>>> >>>> Mostly, was wondering about if: >>>> a) you need pr_cont() handling >>>> b) you need printk_safe() handling >>>> >>>> The reasons I left those things behind: >>>> >>>> a) pr_cont() is officially hated. It was never supposed to be used >>>> on SMP systems. So I wasn't sure if we need all that effort and >>>> add tricky code to handle pr_cont(). Given that syzkaller is >>>> probably the only user of that functionality. >>> >>> >>> Well, if I put my syzkaller hat on, then I don't care what exactly >>> happens in the kernel, the only thing I care is well-formed output on >>> console that can be parsed unambiguously in all cases. >> >> >> +1 for 0day kernel testing. >> >> I admit that goal may never be 100% achievable -- at least some serial >> console logs can sometimes become messy. So we'll have to write dmesg >> parsing code in defensive ways. >> >> But some unnecessary pr_cont() broken-up messages can obviously be >> avoided. For example, >> >> arch/x86/mm/fault.c: >> >> printk(KERN_ALERT "BUG: unable to handle kernel "); >> if (address < PAGE_SIZE) >> printk(KERN_CONT "NULL pointer dereference"); >> else >> printk(KERN_CONT "paging request"); >> >> I've actually proposed to remove the above KERN_CONT, unfortunately the >> patch was silently ignored. > > >I've just cooked this change too, but do you mind reviving your patch? Yes, sure. My version is more dumb. Since I'm not sure if it's OK to do string formatting at this critical point. Let's see how others think about the 2 approaches. I'm fine as long as our problem is fixed. :) diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index 9a84a0d08727..c7b068c6b010 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -671,11 +671,10 @@ show_fault_oops(struct pt_regs *regs, unsigned long error_code, printk(smep_warning, from_kuid(&init_user_ns, current_uid())); } - printk(KERN_ALERT "BUG: unable to handle kernel "); if (address < PAGE_SIZE) - printk(KERN_CONT "NULL pointer dereference"); + printk(KERN_ALERT "BUG: unable to handle kernel NULL pointer dereference"); else - printk(KERN_CONT "paging request"); + printk(KERN_ALERT "BUG: unable to handle kernel paging request"); printk(KERN_CONT " at %px\n", (void *) address); >It actually makes the code even shorter, which is nice: > >--- a/arch/x86/mm/fault.c >+++ b/arch/x86/mm/fault.c >@@ -671,13 +671,9 @@ show_fault_oops(struct pt_regs *regs, unsigned >long error_code, > printk(smep_warning, from_kuid(&init_user_ns, >current_uid())); > } > >- printk(KERN_ALERT "BUG: unable to handle kernel "); >- if (address < PAGE_SIZE) >- printk(KERN_CONT "NULL pointer dereference"); >- else >- printk(KERN_CONT "paging request"); >- >- printk(KERN_CONT " at %px\n", (void *) address); >+ printk(KERN_ALERT "BUG: unable to handle kernel %s at %px\n", >+ (address < PAGE_SIZE ? "NULL pointer dereference" : >+ "paging request"), (void *) address); > > dump_pagetable(address); > } >