diff options
author | Rasmus Villemoes <linux@rasmusvillemoes.dk> | 2018-07-19 10:07:58 -0400 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2018-07-19 10:46:23 -0400 |
commit | 8e974b3b8eddd42a8c43a18e8ea66a3e7b803a0d (patch) | |
tree | a4f022326531962d53f7744e7d1460bbb0eebe47 | |
parent | 9d3cce1e8b8561fed5f383d22a4d6949db4eadbe (diff) |
x86: Avoid pr_cont() in show_opcodes()
If concurrent printk() messages are emitted, then pr_cont() is making it
extremly hard to decode which part of the output belongs to what. See the
convoluted example at:
https://syzkaller.appspot.com/text?tag=CrashReport&x=139d342c400000
Avoid this by using a proper prefix for each line and by using %ph format
in show_opcodes() which emits the 'Code:' line in one go.
Signed-off-by: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: joe@perches.com
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Borislav Petkov <bp@suse.de>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Link: https://lkml.kernel.org/r/1532009278-5953-1-git-send-email-penguin-kernel@I-love.SAKURA.ne.jp
-rw-r--r-- | arch/x86/kernel/dumpstack.c | 28 |
1 files changed, 9 insertions, 19 deletions
diff --git a/arch/x86/kernel/dumpstack.c b/arch/x86/kernel/dumpstack.c index 666a284116ac..9c8652974f8e 100644 --- a/arch/x86/kernel/dumpstack.c +++ b/arch/x86/kernel/dumpstack.c | |||
@@ -22,8 +22,6 @@ | |||
22 | #include <asm/stacktrace.h> | 22 | #include <asm/stacktrace.h> |
23 | #include <asm/unwind.h> | 23 | #include <asm/unwind.h> |
24 | 24 | ||
25 | #define OPCODE_BUFSIZE 64 | ||
26 | |||
27 | int panic_on_unrecovered_nmi; | 25 | int panic_on_unrecovered_nmi; |
28 | int panic_on_io_nmi; | 26 | int panic_on_io_nmi; |
29 | static int die_counter; | 27 | static int die_counter; |
@@ -93,26 +91,18 @@ static void printk_stack_address(unsigned long address, int reliable, | |||
93 | */ | 91 | */ |
94 | void show_opcodes(u8 *rip, const char *loglvl) | 92 | void show_opcodes(u8 *rip, const char *loglvl) |
95 | { | 93 | { |
96 | unsigned int code_prologue = OPCODE_BUFSIZE * 2 / 3; | 94 | #define PROLOGUE_SIZE 42 |
95 | #define EPILOGUE_SIZE 21 | ||
96 | #define OPCODE_BUFSIZE (PROLOGUE_SIZE + 1 + EPILOGUE_SIZE) | ||
97 | u8 opcodes[OPCODE_BUFSIZE]; | 97 | u8 opcodes[OPCODE_BUFSIZE]; |
98 | u8 *ip; | ||
99 | int i; | ||
100 | |||
101 | printk("%sCode: ", loglvl); | ||
102 | |||
103 | ip = (u8 *)rip - code_prologue; | ||
104 | if (probe_kernel_read(opcodes, ip, OPCODE_BUFSIZE)) { | ||
105 | pr_cont("Bad RIP value.\n"); | ||
106 | return; | ||
107 | } | ||
108 | 98 | ||
109 | for (i = 0; i < OPCODE_BUFSIZE; i++, ip++) { | 99 | if (probe_kernel_read(opcodes, rip - PROLOGUE_SIZE, OPCODE_BUFSIZE)) { |
110 | if (ip == rip) | 100 | printk("%sCode: Bad RIP value.\n", loglvl); |
111 | pr_cont("<%02x> ", opcodes[i]); | 101 | } else { |
112 | else | 102 | printk("%sCode: %" __stringify(PROLOGUE_SIZE) "ph <%02x> %" |
113 | pr_cont("%02x ", opcodes[i]); | 103 | __stringify(EPILOGUE_SIZE) "ph\n", loglvl, opcodes, |
104 | opcodes[PROLOGUE_SIZE], opcodes + PROLOGUE_SIZE + 1); | ||
114 | } | 105 | } |
115 | pr_cont("\n"); | ||
116 | } | 106 | } |
117 | 107 | ||
118 | void show_ip(struct pt_regs *regs, const char *loglvl) | 108 | void show_ip(struct pt_regs *regs, const char *loglvl) |