Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3032381ybz; Mon, 27 Apr 2020 08:48:44 -0700 (PDT) X-Google-Smtp-Source: APiQypLeqpspVCZb/dgkx1lMRHFe8dySlICqZF5glrIqglcVXm9YVtaijU3wCgPoiSKUOpov1bow X-Received: by 2002:a17:906:f13:: with SMTP id z19mr7359210eji.380.1588002523888; Mon, 27 Apr 2020 08:48:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588002523; cv=none; d=google.com; s=arc-20160816; b=bkc6ey8edtEh1oZWhBd3PBVd+qX1GW8unVxN2mbHLVdaX+YeeLPsZ3364S18u0vPmZ pK/P9fSD7Yb32Dwd2I2UDZ480QzLX3NKUkKRzFXhxhXAnmrR1FYm0gDdEKKHmdnMhBp4 jBOYVvB5gj1X0dpLNb3C5zNkVgc96+bMNV9d63tveNJLr2ysG8+KfMySWfeY+u26PmMd +oxiU0ciCpQ9w/wCiG2JFvyyqturzYOXDuUMWZt/AEnYRZtbhzpb7vnCzwtrixYNDMii w8c2l8RPYCoPqSJvKvM90RS0de3x5OZrTi4uoiP+qLqW4yAzWplSutNXa9sOb4Yd5m3x QmHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=sVsyz0n2LjXG2IMJx6t3VUYyNBTpyfFbeltK0qpohx0=; b=EAWaKGthbn54wemQ5mwy1VnFKLCD4KMFU+LPzUHqXurs1/Ni0oXe7kYDGNjqlat6ZT GmSfv54uNv+x3bCdB++g2WrRM5Si8aD2UiNGKE3cF8/i5ZgFSqwZa52G76HkH+vkbDJD Jz5Pg2unJOcJKMUQoW+QzU3tUDNVe9lvyN/MreRBYhs3ri/OOCWF2Iga4yZ+nh1hB2ds 22DKNRDEB/XTWBgjqaw+s1hIhjji+RcvoFbLyu69b/nidLeBWhNBP5qxCODqsS8V70Mt PXGyxbb/t7zHoLXTFYfLAcjNKkBRHba9irHa/iRmvgm0Q7KTId0gavZTnXn+1wNg9NbU dXAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@rasmusvillemoes.dk header.s=google header.b=UrD5xFXs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d24si8144712edv.539.2020.04.27.08.48.19; Mon, 27 Apr 2020 08:48:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@rasmusvillemoes.dk header.s=google header.b=UrD5xFXs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728217AbgD0PoH (ORCPT + 99 others); Mon, 27 Apr 2020 11:44:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45892 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726539AbgD0PoG (ORCPT ); Mon, 27 Apr 2020 11:44:06 -0400 Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D3494C0610D5 for ; Mon, 27 Apr 2020 08:44:04 -0700 (PDT) Received: by mail-lj1-x241.google.com with SMTP id g4so18115151ljl.2 for ; Mon, 27 Apr 2020 08:44:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rasmusvillemoes.dk; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=sVsyz0n2LjXG2IMJx6t3VUYyNBTpyfFbeltK0qpohx0=; b=UrD5xFXslZfgP/IsODr4Z3GfOpeNr4l2Y9wwbLA2CxuzqDDSj+VxthzWKGbPbBzx+V YFw7RxVyUbIHs9BPMtLAAdksSlCa1ApMHm8w1kmkg+wpKWWC7zT92sWOiWh0RQB6NlTq 9ck5vp+KJa8tVJztLzVD4UJBbtroaw2dWunMA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=sVsyz0n2LjXG2IMJx6t3VUYyNBTpyfFbeltK0qpohx0=; b=sudoM2DvRsc00JeZ7W1QQXCtoTfDvsPCT0MlUHB/H47yYWk4Ss4Zi9C5gzgeegv6gG 4U7Wr51N3/G96dNzUzmA0rO2eAF410qV4Qq9MijkuAmLe9ls0+tGMKeHveP05OoIGby5 0mla5g8LSjc35l1ao+3360TolqzXYHYQbYospBTK1ZmzABCkf9OqkHXcqDKVQ8WajhHs QESCn6CWl5UJe36wwr4es8b0iqpVH+d4aHuHUQoukAecQ2LLTPPi5uNfhYGZ7Eahp2V+ Gtxrd1XlAGM7WIH+Pkvn0xwv77qIf59lZXfLBHh7xbwiZNLsHpaTSVLQJRZcC2EvOYmW sN9g== X-Gm-Message-State: AGi0PubRM/ZQQbdsPXhXYGrr42OilfwUCoecu5C+JmPgxTQcjb1xKz6s 8qEiwqc7k/CkP58ZRR069l4Khw== X-Received: by 2002:a2e:3017:: with SMTP id w23mr14890688ljw.150.1588002243139; Mon, 27 Apr 2020 08:44:03 -0700 (PDT) Received: from [192.168.1.149] (ip-5-186-116-45.cgn.fibianet.dk. [5.186.116.45]) by smtp.gmail.com with ESMTPSA id b28sm10171986ljo.1.2020.04.27.08.44.01 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 27 Apr 2020 08:44:02 -0700 (PDT) Subject: Re: [RESEND PATCH v3 1/1] lib/vsprintf: Add support for printing V4L2 and DRM fourccs To: Sakari Ailus , Petr Mladek Cc: Andy Shevchenko , linux-media@vger.kernel.org, Dave Stevenson , dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, hverkuil@xs4all.nl, laurent.pinchart@ideasonboard.com, mchehab@kernel.org, Sergey Senozhatsky , Steven Rostedt , Joe Perches , Jani Nikula References: <20200427145303.29943-1-sakari.ailus@linux.intel.com> From: Rasmus Villemoes Message-ID: Date: Mon, 27 Apr 2020 17:44:00 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200427145303.29943-1-sakari.ailus@linux.intel.com> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/04/2020 16.53, Sakari Ailus wrote: > Add a printk modifier %p4cc (for pixel format) for printing V4L2 and DRM > pixel formats denoted by fourccs. The fourcc encoding is the same for both > so the same implementation can be used. > > Suggested-by: Mauro Carvalho Chehab > Signed-off-by: Sakari Ailus > --- > since v2: > > - Add comments to explain why things are being done > > - Print characters under 32 (space) as hexadecimals in parenthesis. > > - Do not print spaces in the fourcc codes. > > - Make use of a loop over the fourcc characters instead of > put_unaligned_le32(). This is necessary to omit spaces in the output. > > - Use DRM style format instead of V4L2. This provides the precise code as > a numerical value as well as explicit endianness information. > > - Added WARN_ON_ONCE() sanity checks. Comments on these are welcome; I'd > expect them mostly be covered by the tests. > > - Added tests for %p4cc in lib/test_printf.c > > Documentation/core-api/printk-formats.rst | 12 ++++ > lib/test_printf.c | 17 +++++ > lib/vsprintf.c | 86 +++++++++++++++++++++++ > 3 files changed, 115 insertions(+) > > diff --git a/Documentation/core-api/printk-formats.rst b/Documentation/core-api/printk-formats.rst > index 8ebe46b1af39..7aa0451e06fb 100644 > --- a/Documentation/core-api/printk-formats.rst > +++ b/Documentation/core-api/printk-formats.rst > @@ -545,6 +545,18 @@ For printing netdev_features_t. > > Passed by reference. > > +V4L2 and DRM FourCC code (pixel format) > +--------------------------------------- > + > +:: > + > + %p4cc > + > +Print a FourCC code used by V4L2 or DRM, including format endianness and > +its numerical value as hexadecimal. > + > +Passed by reference. > + > Thanks > ====== > > diff --git a/lib/test_printf.c b/lib/test_printf.c > index 2d9f520d2f27..a14754086707 100644 > --- a/lib/test_printf.c > +++ b/lib/test_printf.c > @@ -624,6 +624,22 @@ static void __init fwnode_pointer(void) > software_node_unregister_nodes(softnodes); > } > > +static void __init fourcc_pointer(void) > +{ > + struct { > + u32 code; > + char *str; > + } const try[] = { > + { 0x20104646, "FF(10) little-endian (0x20104646)", }, > + { 0xa0104646, "FF(10) big-endian (0xa0104646)", }, > + { 0x10111213, "(13)(12)(11)(10) little-endian (0x10111213)", }, > + }; > + unsigned int i; > + > + for (i = 0; i < ARRAY_SIZE(try); i++) > + test(try[i].str, "%p4cc", &try[i].code); > +} > + > static void __init > errptr(void) > { > @@ -668,6 +684,7 @@ test_pointer(void) > flags(); > errptr(); > fwnode_pointer(); > + fourcc_pointer(); > } > > static void __init selftest(void) > diff --git a/lib/vsprintf.c b/lib/vsprintf.c > index 7c488a1ce318..02e7906619c0 100644 > --- a/lib/vsprintf.c > +++ b/lib/vsprintf.c > @@ -1721,6 +1721,89 @@ char *netdev_bits(char *buf, char *end, const void *addr, > return special_hex_number(buf, end, num, size); > } > > +static noinline_for_stack > +char *fourcc_string(char *buf, char *end, const u32 *__fourcc, > + struct printf_spec spec, const char *fmt) > +{ > +#define FOURCC_HEX_CHAR_STR "(xx)" > +#define FOURCC_BIG_ENDIAN_STR " big-endian" > +#define FOURCC_LITTLE_ENDIAN_STR " little-endian" > +#define FOURCC_HEX_NUMBER " (0x01234567)" > +#define FOURCC_STRING_MAX \ > + FOURCC_HEX_CHAR_STR FOURCC_HEX_CHAR_STR FOURCC_HEX_CHAR_STR \ > + FOURCC_HEX_CHAR_STR FOURCC_LITTLE_ENDIAN_STR FOURCC_HEX_NUMBER > + struct printf_spec my_spec = { > + .type = FORMAT_TYPE_UINT, > + .field_width = 2, > + .flags = SMALL, > + .base = 16, > + .precision = -1, > + }; > + char __s[sizeof(FOURCC_STRING_MAX)]; > + char *s = __s; > + unsigned int i; > + /* > + * The 31st bit defines the endianness of the data, so save its printing > + * for later. > + */ > + u32 fourcc = *__fourcc & ~BIT(31); > + int ret; Dereference __fourcc ... > + if (check_pointer(&buf, end, __fourcc, spec)) > + return buf; .. and then sanity check it? > + if (fmt[1] != 'c' || fmt[2] != 'c') > + return error_string(buf, end, "(%p4?)", spec); Doesn't that want to come before everything else, including the check_pointer()? > + for (i = 0; i < sizeof(fourcc); i++, fourcc >>= 8) { > + unsigned char c = fourcc; > + > + /* Weed out spaces */ > + if (c == ' ') > + continue; > + > + /* Print non-control characters as-is */ > + if (c > ' ') { > + *s = c; > + s++; > + continue; > + } Are you sure you want to pass non-ascii characters through? > + if (WARN_ON_ONCE(sizeof(__s) < > + (s - __s) + sizeof(FOURCC_HEX_CHAR_STR))) > + break; I really don't see the point of these checks. Why check here but not before we output a non-control character? That seems rather arbitrary. Also, assume we do take this break, (to be continued below [*]) > + *s = '('; > + s++; > + s = number(s, s + 2, c, my_spec); You can drop my_spec and just use "s = hex_byte_pack(s, c);". > + *s = ')'; > + s++; > + } > + > + ret = strscpy(s, *__fourcc & BIT(31) ? FOURCC_BIG_ENDIAN_STR > + : FOURCC_LITTLE_ENDIAN_STR, > + sizeof(__s) - (s - __s)); > + if (!WARN_ON_ONCE(ret < 0)) > + s += ret; > + > + if (!WARN_ON_ONCE(sizeof(__s) < > + (s - __s) + sizeof(FOURCC_HEX_NUMBER))) { [*] then AFAICT this WARN_ON_ONCE is guaranteed to also fire [the left-hand side is the same as before, the right-hand side consists of a quantity s-__s that can only be larger or equal than before and a constant sizeof(FOURCC_HEX_NUMBER) that is definitely larger], hence we do not enter this if () and [**] > + *s = ' '; > + s++; > + *s = '('; > + s++; > + /* subtract parentheses and the space from the size */ > + special_hex_number(s, s + sizeof(FOURCC_HEX_NUMBER) - 3, > + *__fourcc, sizeof(u32)); Urgh. Don't we have an ARRAY_END() macro that let's you call this with (s, ARRAY_END(__s)) as buf, end? > + s += sizeof(u32) * 2 + 2 /* 0x */; Why, when special_hex_number returns a pointer to one-past-its-output? > + *s = ')'; > + s++; > + *s = '\0'; > + } > + > + return string(buf, end, __s, spec); [**] __s does not get nul-terminated, so we call string() with stack garbage. I'd say just drop those checks, and de-obfuscate the sizing of the __s array so it becomes obviously large enough for what the algorithm can produce. Just char __s[sizeof("(01)(02)(03)(04) little-endian (0x01020304)")] or something like that should be sufficient. Rasmus