[RFC][PATCH 7/7] printk: new printk() recursion detection
From: Sergey Senozhatsky
Date: Tue Sep 27 2016 - 10:24:51 EST
We can't use alt_printk when we are flushing alt_printk buffers to logbuf,
because otherwise we would just flush messages back to alt_printk buffers.
At the same time, this opens a door for potential deadlock, should flushing
endup in recursive printk() call:
irq_work_run()
alt_printk_flush_line()
printk()
WARN_ON()
^^^^^^^^^
depending on circumstances this can result in printk-deadlock.
To cope with it, we can use alt_printk context ->entry_count:
- __alt_printk_flush() sets ->entry_count to 1
- every printk() call from alt_printk_flush_foo() calls
alt_printk_enter() and alt_printk_exit()
- alt_printk_enter() increments ->entry_count and tests the value:
- if it's `==2' then we are in normal alt_printk_flush()->printk() path
- if it's `>=3' then we are in recursion. The first time we detect
recursion (->entry_count == 3) we switch from default printk() to
alt_printk(), to avoid possible deadlocks.
- in alt_printk_exit() we test if we were in normal printk() path or
in printk() recursion and rollback to default printk() if so;
and decrement ->entry_count.
->entry_count is a per-cpu variable, which must be touched only with
local IRQs disabled. NMI should never touch ->entry_count.
An example:
WARN_ON() from printk() while alt_printk_flush() flushed messages
from alt_printk buffer to a logbuf:
------------[ cut here ]------------
WARNING: CPU: 1 PID: 332 at kernel/printk/printk.c:1775 vprintk_emit+0x73/0x398
CPU: 1 PID: 332 Comm: bash
Call Trace:
<IRQ> [<ffffffff811f23ae>] dump_stack+0x68/0x92
[<ffffffff8103d649>] __warn+0xb8/0xd3
[<ffffffff8103d6ca>] warn_slowpath_null+0x18/0x1a
[<ffffffff8107fdb6>] vprintk_emit+0x73/0x398
[<ffffffff8108023d>] vprintk_default+0x18/0x1a
[<ffffffff810c7fa5>] printk+0x43/0x4b
[<ffffffff81080fc3>] alt_printk_flush_line+0x27/0x29
[<ffffffff810810e1>] __alt_printk_flush+0xd7/0x12d
[<ffffffff810b6356>] irq_work_run_list+0x43/0x67
[<ffffffff810b6595>] irq_work_run+0x2a/0x44
[<ffffffff81016925>] smp_trace_irq_work_interrupt+0x29/0x30
[<ffffffff81016935>] smp_irq_work_interrupt+0x9/0xb
[<ffffffff814c3fe6>] irq_work_interrupt+0x86/0x90
<EOI> [<ffffffff814c2577>] ? _raw_spin_unlock+0x2c/0x3f
[<ffffffff8107fd12>] ? console_unlock+0x528/0x559
[<ffffffff810800ca>] vprintk_emit+0x387/0x398
[<ffffffff8108023d>] vprintk_default+0x18/0x1a
[<ffffffff810c7fa5>] printk+0x43/0x4b
[..]
[<ffffffff814c2daa>] entry_SYSCALL_64_fastpath+0x18/0xad
---[ end trace ]---
Signed-off-by: Sergey Senozhatsky <sergey.senozhatsky@xxxxxxxxx>
---
kernel/printk/alt_printk.c | 26 +++++++++++++++++++++++---
kernel/printk/internal.h | 5 +++++
kernel/printk/printk.c | 38 ++------------------------------------
3 files changed, 30 insertions(+), 39 deletions(-)
diff --git a/kernel/printk/alt_printk.c b/kernel/printk/alt_printk.c
index 8ac1daa..0302ea3 100644
--- a/kernel/printk/alt_printk.c
+++ b/kernel/printk/alt_printk.c
@@ -69,6 +69,9 @@ atomic_t nmi_message_lost;
#define MAX_ALT_PRINTK_CTX 1
#endif
+#define CTX_ENTRY_FLUSHING 2
+#define CTX_ENTRY_FLUSHING_RECURSION (CTX_ENTRY_FLUSHING + 1)
+
struct alt_printk_ctx {
atomic_t idx;
unsigned int entry_count;
@@ -189,10 +192,15 @@ void alt_printk_enter(void)
* will see ->entry_count > 2.
*/
ctx->entry_count++;
- if (ctx->entry_count > 1)
+ if (ctx->entry_count == CTX_ENTRY_FLUSHING)
return;
- /* @TODO: do something sensible in case of printk() recursion */
+ /*
+ * Once ->entry_coun == CTX_ENTRY_FLUSHING_RECURSION printk()
+ * switches to alt_printk() buffers.
+ */
+ if (ctx->entry_count > CTX_ENTRY_FLUSHING_RECURSION)
+ return;
__lockless_printk_enter(vprintk_alt);
}
@@ -202,11 +210,23 @@ void alt_printk_exit(void)
{
struct alt_printk_ctx *ctx = this_cpu_ptr(&alt_printk_ctx);
- if (ctx->entry_count == 1)
+ /*
+ * If we are returning from a normal alt_printk context or
+ * from printk() recursion -- switch back to default printk.
+ */
+ if (ctx->entry_count == 1 ||
+ ctx->entry_count == CTX_ENTRY_FLUSHING_RECURSION)
__lockless_printk_exit();
ctx->entry_count--;
}
+bool recursed_printk_call(void)
+{
+ struct alt_printk_ctx *ctx = this_cpu_ptr(&alt_printk_ctx);
+
+ return oops_in_progress && (ctx->entry_count > CTX_ENTRY_FLUSHING);
+}
+
static void alt_printk_flush_line(const char *text, int len)
{
/*
diff --git a/kernel/printk/internal.h b/kernel/printk/internal.h
index b030ca0..7d082b7 100644
--- a/kernel/printk/internal.h
+++ b/kernel/printk/internal.h
@@ -34,11 +34,16 @@ DECLARE_PER_CPU(printk_func_t, printk_func);
void alt_printk_enter(void);
void alt_printk_exit(void);
+bool recursed_printk_call(void);
#else
void alt_printk_enter(void) { }
void alt_printk_exit(void) { }
+bool recursed_printk_call(void)
+{
+ return false;
+}
#endif /* CONFIG_PRINTK */
diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c
index e5dacfb..47f1e0e 100644
--- a/kernel/printk/printk.c
+++ b/kernel/printk/printk.c
@@ -1748,18 +1748,14 @@ asmlinkage int vprintk_emit(int facility, int level,
const char *dict, size_t dictlen,
const char *fmt, va_list args)
{
- static bool recursion_bug;
static char textbuf[LOG_LINE_MAX];
char *text = textbuf;
size_t text_len = 0;
enum log_flags lflags = 0;
unsigned long flags;
- int this_cpu;
int printed_len = 0;
int nmi_message_lost;
bool in_sched = false;
- /* cpu currently holding logbuf_lock in this function */
- static unsigned int logbuf_cpu = UINT_MAX;
if (level == LOGLEVEL_SCHED) {
level = LOGLEVEL_DEFAULT;
@@ -1770,42 +1766,13 @@ asmlinkage int vprintk_emit(int facility, int level,
printk_delay();
local_irq_save(flags);
- this_cpu = smp_processor_id();
+ alt_printk_enter();
- /*
- * Ouch, printk recursed into itself!
- */
- if (unlikely(logbuf_cpu == this_cpu)) {
- /*
- * If a crash is occurring during printk() on this CPU,
- * then try to get the crash message out but make sure
- * we can't deadlock. Otherwise just return to avoid the
- * recursion and return - but flag the recursion so that
- * it can be printed at the next appropriate moment:
- */
- if (!oops_in_progress && !lockdep_recursing(current)) {
- recursion_bug = true;
- local_irq_restore(flags);
- return 0;
- }
+ if (recursed_printk_call())
zap_locks();
- }
- alt_printk_enter();
/* This stops the holder of console_sem just where we want him */
raw_spin_lock(&logbuf_lock);
- logbuf_cpu = this_cpu;
-
- if (unlikely(recursion_bug)) {
- static const char recursion_msg[] =
- "BUG: recent printk recursion!";
-
- recursion_bug = false;
- /* emit KERN_CRIT message */
- printed_len += log_store(0, 2, LOG_PREFIX|LOG_NEWLINE, 0,
- NULL, 0, recursion_msg,
- strlen(recursion_msg));
- }
nmi_message_lost = get_nmi_message_lost();
if (unlikely(nmi_message_lost)) {
@@ -1898,7 +1865,6 @@ asmlinkage int vprintk_emit(int facility, int level,
dict, dictlen, text, text_len);
}
- logbuf_cpu = UINT_MAX;
raw_spin_unlock(&logbuf_lock);
alt_printk_exit();
local_irq_restore(flags);
--
2.10.0.372.g6fe1b14