Re: [PATCH v6 1/3] printk: Add line-buffered printk() API.

From: Sergey Senozhatsky
Date: Mon Nov 12 2018 - 02:59:29 EST


On (11/09/18 15:10), Petr Mladek wrote:
> >
> > If I'm not mistaken, this is for the futute "printk injection" work.
>
> The above code only tries to push complete lines to the main log buffer
> and consoles ASAP. It sounds like a Good Idea(tm).

Probably it is. So *quite likely* I'm wrong here.

Hmm... Thinking out loud.
At the same time, splitting a single logbuf entry gives a chance to other
events to mix in. Example:
pr_cont("Foo:");
pr_cont("\nbar");
pr_cont("\n");

Previously it could been stored in one logbuf entry (one logstore,
one console_trylock_spinning), which means that it could have been
printed in one go:

call_console_drivers()
spin_trylock_irqsave(&port->lock, flags);
uart_console_write(.... "Foo:\nbar\n");
spin_unlock_irqrestore(&port->lock, flags);

While with buffered printk, it will be store in two logbuf entries,
and printed in two goes:

call_console_drivers()
spin_trylock_irqsave(&port->lock, flags);
uart_console_write(.... "Foo:\nbar\n");
spin_unlock_irqrestore(&port->lock, flags);

<< ... console driver IRQ, TX port->state->xmit chars ... >>>

call_console_drivers()
spin_trylock_irqsave(&port->lock, flags);
uart_console_write(.... "Foo:\nbar\n");
spin_unlock_irqrestore(&port->lock, flags);

So, *technically*, we now let more events to happens between printk-s.

But, let's look at some of pr_cont() usage examples.
E.g. dump() from arch/h8300/kernel/traps.c. The code in question looks
as follows:

pr_info("\nKERNEL STACK:");
tp = ((unsigned char *) fp) - 0x40;
for (sp = (unsigned long *) tp, i = 0; (i < 0x40); i += 4) {
if ((i % 0x10) == 0)
pr_info("\n%08x: ", (int) (tp + i));
pr_info("%08x ", (int) *sp++);
}
pr_info("\n");

dmesg

[ 15.260099] 0000: 00000000 00000010 00000040 00000090
0010: 00000100 00000190 00000240 00000310
0020: 00000400 00000510 00000640 00000790
0030: 00000900 00000a90 00000c40 00000e10

So we have the entire KERNEL STACK stored as a single line, in
a single logbuf entry.

cat /dev/kmsg

4,687,15260099,c;\x0a0000: 00000000 00000010 00000040 00000090 \x0a0010: 00000100 00000190 00000240 00000310 \x0a0020: 00000400 00000510 00000640 00000790 \x0a0030: 00000900 00000a90 00000c40 00000e10

Shall we consider this as a "reference" representation: data that
pr_cont(), ideally, would have stored as a single logbuf entry? And
then compare the "reference" representation and what buffered printk
does.

Buffered printk always stores this as several lines, IOW several
logbuf entries.

cat /dev/kmsg

4,690,15260152,-;0000: 00000000 00000010 00000040 00000090
4,691,15260154,-;0010: 00000100 00000190 00000240 00000310
4,692,15260157,-;0020: 00000400 00000510 00000640 00000790
4,694,15260161,-;0030: 00000900 00000a90 00000c40 00000e10

So if we will have concurrent printk()-s happening on other CPUs,
then the KERNEL STACK data block still can be a bit hard to read:

[ 15.260152] 0000: 00000000 00000010 00000040 00000090
<printk CPU1> ... foo bar foo bar
<printk CPU2> ... foo bar foo bar
...
[ 15.260154] 0010: 00000100 00000190 00000240 00000310
<printk CPU3> ... foo bar foo bar
<printk CPU2> ... foo bar foo bar
...
... and so on; you got the idea.

> No, please note that the for cycle searches for '\n' from the end
> of the string.

You are right, I didn't notice that. Indeed.


Tetsuo, lockdep report with buffered printks looks a bit different:

kernel: Possible unsafe locking scenario:
kernel: CPU0 CPU1
kernel: ---- ----
kernel: lock(bar_lock);
kernel: lock(
kernel: foo_lock);
kernel: lock(bar_lock);
kernel: lock(foo_lock);
kernel:


> > len = vsprintf();
> > if (len && text[len - 1] == '\n' || overflow)
> > flush();
>
> I had the same idea. Tetsuo ignored it. I looked for more arguments
> and found that '\n' is used in the middle of several pr_cont()
> calls

OK, so we probably can have that new semantics. But we might split
something that possibly was meant to be a single line with a bunch
of \n in the middle.

-ss