Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp269523img; Wed, 20 Mar 2019 20:00:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqzGfnNQQ/DkkX0Cny6j6KyrCwEY3T1ek5bsFJ7WVGLJ54B8tdwDAbMAp5hXjtSrbP8cJYcw X-Received: by 2002:a62:59cb:: with SMTP id k72mr1164826pfj.111.1553137249900; Wed, 20 Mar 2019 20:00:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553137249; cv=none; d=google.com; s=arc-20160816; b=XKMUv8bfNA4CjFUfmHv5qmKdWxueMjpf8GRfSGnnUSjx0bF0KsIBsVegqUXBl4iqUO SfWD0Z2nNg5JYMTGeKUbAT8Hwb6NK2Olbs8WfJA0UoBhavP4dtdnIEVTaYuPfgrM/Ok8 QmQhUMadIvy4/PYn6NRnos1VCAocr3plrFboyTgq0WbMO8nRc01VkDw5Ifp2oLQRJW1V Qbqh2yw1/KFJLIzaRhhn12ZYAjMgWgiuTlPo3fj9bNgacXVGq6bb2u29JFSzmNl8yYiK 4ZJEh5V8maUwjLitmGwjcGG63nH6Vh+VUgbJySMsCicNG0XsSnamt6n1uucOku3bv079 ijmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=nb5u2BQdCSmZ+O5tkesmFT4HeTaYC6AMQlY/oGA8/XA=; b=B7Tx2IgdLoW1nvvX1z28CR6KAXh7cedY4ztf4kVsXrDM3dyq9VoUAivHAll2QbPrYj YqllbVmvG/RUhwQtdTY1aN40Chb3Q2jzKUOUKK2iXQFpYT7Jkq7VJ1Rwnej3i/2dE8yf Fj5HOIAsur2HjlisFSHZTU+CEXoNezq3Qg4YqYdpKghptAXvjDdNqEX1P2lENI6+Z8xY iBa6IyGV380rr81h4fJnR4eEIAe0X30u1WINeLgRGIOG9oXvLYrvJ3ZDA0Pel0nu899p BQhQM3omFXix9BMcnBNYubZ34LfkpRtASPoiMCf0GERzBsfUkXz5d2sWlw5rLI3Q2nWI sSdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d81si3146643pfm.252.2019.03.20.20.00.33; Wed, 20 Mar 2019 20:00:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727835AbfCUC76 (ORCPT + 99 others); Wed, 20 Mar 2019 22:59:58 -0400 Received: from ozlabs.org ([203.11.71.1]:55507 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726983AbfCUC76 (ORCPT ); Wed, 20 Mar 2019 22:59:58 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 44Ps2y6Fmjz9sR4; Thu, 21 Mar 2019 13:59:54 +1100 (AEDT) From: Michael Ellerman To: Tetsuo Handa , Petr Mladek , Sergey Senozhatsky Cc: Dmitry Vyukov , Sergey Senozhatsky , Steven Rostedt , Linus Torvalds , Andrew Morton , LKML , syzkaller Subject: Re: [PATCH] printk: Add caller information to printk() output. In-Reply-To: <93f19e57-5051-c67d-9af4-b17624062d44@i-love.sakura.ne.jp> References: <20181203150603.cdqii263e4kmmibo@pathway.suse.cz> <20181204152724.ypk44mi4a56nrud4@pathway.suse.cz> <459018db-763b-9520-ead2-2c0d5975fbf3@i-love.sakura.ne.jp> <20181210130930.bas4fozjhe3dc5nu@pathway.suse.cz> <20181213121847.mwlr2vyv6qzclhk6@pathway.suse.cz> <20181213124255.GB3053@tigerII.localdomain> <20181217145452.3kev4rmo2l5lt2qy@pathway.suse.cz> <93f19e57-5051-c67d-9af4-b17624062d44@i-love.sakura.ne.jp> Date: Thu, 21 Mar 2019 13:59:53 +1100 Message-ID: <871s312aqe.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Tetsuo, Thanks for implementing this, it's really helpful. Tetsuo Handa writes: ... > From 91f85d2bd494df2f73c605d8b4747e8cc0a61ae2 Mon Sep 17 00:00:00 2001 > From: Tetsuo Handa > Date: Tue, 18 Dec 2018 05:53:04 +0900 > Subject: [PATCH] printk: Add caller information to printk() output. > > Sometimes we want to print a series of printk() messages to consoles > without being disturbed by concurrent printk() from interrupts and/or > other threads. But we can't enforce printk() callers to use their local > buffers because we need to ask them to make too much changes. Also, even > buffering up to one line inside printk() might cause failing to emit > an important clue under critical situation. > > Therefore, instead of trying to help buffering, let's try to help > reconstructing messages by saving caller information as of calling > log_store() and adding it as "[T$thread_id]" or "[C$processor_id]" > upon printing to consoles. > > Some examples for console output: > > [ 1.222773][ T1] x86: Booting SMP configuration: > [ 2.779635][ T1] pci 0000:00:01.0: PCI bridge to [bus 01] > [ 5.069193][ T268] Fusion MPT base driver 3.04.20 > [ 9.316504][ C2] random: fast init done > [ 13.413336][ T3355] Initialized host personality > > Some examples for /dev/kmsg output: > > 6,496,1222773,-,caller=T1;x86: Booting SMP configuration: > 6,968,2779635,-,caller=T1;pci 0000:00:01.0: PCI bridge to [bus 01] > SUBSYSTEM=pci > DEVICE=+pci:0000:00:01.0 > 6,1353,5069193,-,caller=T268;Fusion MPT base driver 3.04.20 > 5,1526,9316504,-,caller=C2;random: fast init done > 6,1575,13413336,-,caller=T3355;Initialized host personality > > Note that this patch changes max length of messages which can be printed > by printk() or written to /dev/kmsg interface from 992 bytes to 976 bytes, > based on an assumption that userspace won't try to write messages hitting > that border line to /dev/kmsg interface. Do you have any plans to update dmesg or other userspace tools to show the caller information? cheers