Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2861915imu; Mon, 17 Dec 2018 09:01:39 -0800 (PST) X-Google-Smtp-Source: AFSGD/UGaFrrP2NYunGERO06Nl50VFVLMSp7NcA25gz+cnceqC4K86dggjBMpGyPT9jNFOJeZ53D X-Received: by 2002:a62:c42:: with SMTP id u63mr13186598pfi.73.1545066099445; Mon, 17 Dec 2018 09:01:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545066099; cv=none; d=google.com; s=arc-20160816; b=LR7SBoJ+QyFtKv+/rmRugX3s0D+oUnHPoUtXkr65jlYn0mXiwU9Pex1SiCYwPixtsP f+tVCnWS/IV+ofQXC9Jozcl/QemHhI5ZLOATX6eOEfK4XvlieJ7IXNoBB7MA5rgmFY5S MRXcEuN0+xb27xkNPhwzUsPgwXcD9lldUY8XzRziUSY4CxjpLuJeSk6jYQsqkIGVBs/N pxYfjlFEYc74WaDduDUUfKjEdh7o1IgJrTAItHgVZ2+6/9Ph+nfynWUXvx37L8/3ih8r i9/vCp95FC9sClopI4s8EFuA0Wi1P5ZmgMTn8bAcb69WdsITv7Ox6n2BIiGGo+hx60xe aRdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=LPNM66pAQO+tBw1qmViAXJ9aqtx7Fzo+IXrVwSL2/yw=; b=o8A3WAeiBX6p2ytEfatcAip72qOhdWKWqbEdnmWgLDgH7lHEitTyD7+MdL42i5nLDZ qyaX71tDIKHexvUp/fWMIaHsLCT1RcwwbYoDdpehFEptpnNqYwEezQ5WP1mYl7AXRnOh Di+gwBn+2MQMk5GtsVTXNWBCxj6evlY75d7u6GwgeZ/L6Plg6d84Td6WcujzoBNThfmR 3fcFrxTFjYTEHM4gZYYLRELqbs/EasjMDzDXW5CvKrfitKYsvzZnWxeYj4/5Qw8BsNSE Ln5kVt0NNvNR2wzUI4JkPxExmuykYbe5sjaYB10mTsf6h0IkbuzE9Ll16ZtdBa5Mp9kk PqlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q26si9193040pgk.162.2018.12.17.09.01.23; Mon, 17 Dec 2018 09:01:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732819AbeLQM22 (ORCPT + 99 others); Mon, 17 Dec 2018 07:28:28 -0500 Received: from ozlabs.org ([203.11.71.1]:38229 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727186AbeLQM22 (ORCPT ); Mon, 17 Dec 2018 07:28:28 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43JL6L30wlz9s4s; Mon, 17 Dec 2018 23:28:26 +1100 (AEDT) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=ellerman.id.au From: Michael Ellerman To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v2] powerpc/mm: make NULL pointer deferences explicit on bad page faults. In-Reply-To: <46e2533084dc3255a1d67553b682bd4b9642b176.1544800765.git.christophe.leroy@c-s.fr> References: <46e2533084dc3255a1d67553b682bd4b9642b176.1544800765.git.christophe.leroy@c-s.fr> Date: Mon, 17 Dec 2018 23:28:19 +1100 Message-ID: <87mup4tk0s.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christophe Leroy writes: > diff --git a/arch/powerpc/mm/fault.c b/arch/powerpc/mm/fault.c > index 01b9bcc7fa85..3398291f4785 100644 > --- a/arch/powerpc/mm/fault.c > +++ b/arch/powerpc/mm/fault.c > @@ -636,21 +636,24 @@ void bad_page_fault(struct pt_regs *regs, unsigned long address, int sig) > switch (TRAP(regs)) { > case 0x300: > case 0x380: > - printk(KERN_ALERT "Unable to handle kernel paging request for " > - "data at address 0x%08lx\n", regs->dar); > + if (regs->dar < PAGE_SIZE) > + pr_alert("BUG: Kernel NULL pointer dereference"); > + else > + pr_alert("BUG: Unable to handle kernel data access"); > + pr_cont(" at 0x%08lx\n", regs->dar); It's best to avoid pr_cont() as it can lead to interleaving, so I rewrote this as: pr_alert("BUG: %s at 0x%08lx\n", regs->dar < PAGE_SIZE ? "Kernel NULL pointer dereference" : "Unable to handle kernel data access", regs->dar); > break; > case 0x400: > case 0x480: > - printk(KERN_ALERT "Unable to handle kernel paging request for " > - "instruction fetch\n"); > + pr_alert("BUG: Unable to handle kernel instruction fetch%s", > + regs->nip < PAGE_SIZE ? " (NULL pointer ?)\n" : "\n"); I dropped the space here ^ cheers