Skip to content

Commit

Permalink
printk: Userspace format enumeration support
Browse files Browse the repository at this point in the history
We have a number of systems industry-wide that have a subset of their
functionality that works as follows:

1. Receive a message from local kmsg, serial console, or netconsole;
2. Apply a set of rules to classify the message;
3. Do something based on this classification (like scheduling a
   remediation for the machine), rinse, and repeat.

As a couple of examples of places we have this implemented just inside
Facebook, although this isn't a Facebook-specific problem, we have this
inside our netconsole processing (for alarm classification), and as part
of our machine health checking. We use these messages to determine
fairly important metrics around production health, and it's important
that we get them right.

While for some kinds of issues we have counters, tracepoints, or metrics
with a stable interface which can reliably indicate the issue, in order
to react to production issues quickly we need to work with the interface
which most kernel developers naturally use when developing: printk.

Most production issues come from unexpected phenomena, and as such
usually the code in question doesn't have easily usable tracepoints or
other counters available for the specific problem being mitigated. We
have a number of lines of monitoring defence against problems in
production (host metrics, process metrics, service metrics, etc), and
where it's not feasible to reliably monitor at another level, this kind
of pragmatic netconsole monitoring is essential.

As you'd expect, monitoring using printk is rather brittle for a number
of reasons -- most notably that the message might disappear entirely in
a new version of the kernel, or that the message may change in some way
that the regex or other classification methods start to silently fail.

One factor that makes this even harder is that, under normal operation,
many of these messages are never expected to be hit. For example, there
may be some rare hardware bug which you want to detect if it was to ever
happen again, but its recurrence is not likely or anticipated. This
precludes using something like checking whether the printk in question
was printed somewhere fleetwide recently to determine whether the
message in question is still present or not, since we don't anticipate
that it should be printed anywhere, but still need to monitor for its
future presence in the long-term.

This class of issue has happened on a number of occasions, causing
unhealthy machines with hardware issues to remain in production for
longer than ideal. As a recent example, some monitoring around
blk_update_request fell out of date and caused semi-broken machines to
remain in production for longer than would be desirable.

Searching through the codebase to find the message is also extremely
fragile, because many of the messages are further constructed beyond
their callsite (eg. btrfs_printk and other module-specific wrappers,
each with their own functionality). Even if they aren't, guessing the
format and formulation of the underlying message based on the aesthetics
of the message emitted is not a recipe for success at scale, and our
previous issues with fleetwide machine health checking demonstrate as
much.

This patch provides a solution to the issue of silently changed or
deleted printks: we record pointers to all printk format strings known
at compile time into a new .printk_fmts section, both in vmlinux and
modules. At runtime, this can then be iterated by looking at
<debugfs>/printk/formats/<module>, which emits the same format as
`printk` itself, which we already export elsewhere (for example, in
netconsole).

As an example of how simple a parser for this format can be:

    $ cat pf.py
    #!/usr/bin/env python
    with open("/sys/kernel/debug/printk/formats/vmlinux") as f:
        raw_fmts = f.read().split("\x00")[:-1]
        for raw_fmt in raw_fmts:
            level, fmt = raw_fmt[1], raw_fmt[2:]
            print(f"Level {level}: {fmt!r}")

    $ ./pf.py | shuf -n 5
    Level 4: 'Build ID is too large to include in vmcoreinfo: %u > %u\n'
    Level 3: 'BIOS bug, no explicit IRQ entries, using default mptable. (tell your hw vendor)\n'
    Level 3: 'Failed to execute %s (error %d)\n'
    Level 3: 'CHRDEV "%s" minor range requested (%u-%u) is out of range of maximum range (%u-%u) for a single major\n'
    Level 3: "slub_debug option '%c' unknown. skipped\n"

This mitigates the majority of cases where we have a highly-specific
printk which we want to match on, as we can now enumerate and check
whether the format changed or the printk callsite disappeared entirely
in userspace. This allows us to catch changes to printks we monitor
earlier and decide what to do about it before it becomes problematic.

There is no additional runtime cost for printk callers or printk itself,
and the assembly generated is exactly the same.

Signed-off-by: Chris Down <chris@chrisdown.name>
Cc: Petr Mladek <pmladek@suse.com>
Cc: Sergey Senozhatsky <sergey.senozhatsky@gmail.com>
Cc: John Ogness <john.ogness@linutronix.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Johannes Weiner <hannes@cmpxchg.org>
Cc: Kees Cook <keescook@chromium.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
  • Loading branch information
cdown authored and intel-lab-lkp committed Feb 12, 2021
1 parent 1fa67f8 commit bff4c8b
Show file tree
Hide file tree
Showing 16 changed files with 318 additions and 24 deletions.
2 changes: 1 addition & 1 deletion arch/arm/kernel/entry-v7m.S
Expand Up @@ -23,7 +23,7 @@ __invalid_entry:
adr r0, strerr
mrs r1, ipsr
mov r2, lr
bl printk
bl _printk
#endif
mov r0, sp
bl show_regs
Expand Down
2 changes: 1 addition & 1 deletion arch/arm/lib/backtrace-clang.S
Expand Up @@ -202,7 +202,7 @@ finished_setup:
1006: adr r0, .Lbad
mov r1, loglvl
mov r2, frame
bl printk
bl _printk
no_frame: ldmfd sp!, {r4 - r9, fp, pc}
ENDPROC(c_backtrace)
.pushsection __ex_table,"a"
Expand Down
2 changes: 1 addition & 1 deletion arch/arm/lib/backtrace.S
Expand Up @@ -103,7 +103,7 @@ for_each_frame: tst frame, mask @ Check for address exceptions
1006: adr r0, .Lbad
mov r1, loglvl
mov r2, frame
bl printk
bl _printk
no_frame: ldmfd sp!, {r4 - r9, pc}
ENDPROC(c_backtrace)

Expand Down
2 changes: 1 addition & 1 deletion arch/arm/mach-rpc/io-acorn.S
Expand Up @@ -25,4 +25,4 @@ ENTRY(insl)
ENTRY(outsl)
adr r0, .Liosl_warning
mov r1, lr
b printk
b _printk
6 changes: 3 additions & 3 deletions arch/arm/vfp/vfphw.S
Expand Up @@ -23,7 +23,7 @@
#ifdef DEBUG
stmfd sp!, {r0-r3, ip, lr}
ldr r0, =1f
bl printk
bl _printk
ldmfd sp!, {r0-r3, ip, lr}

.pushsection .rodata, "a"
Expand All @@ -38,7 +38,7 @@
stmfd sp!, {r0-r3, ip, lr}
mov r1, \arg
ldr r0, =1f
bl printk
bl _printk
ldmfd sp!, {r0-r3, ip, lr}

.pushsection .rodata, "a"
Expand All @@ -55,7 +55,7 @@
mov r2, \arg2
mov r1, \arg1
ldr r0, =1f
bl printk
bl _printk
ldmfd sp!, {r0-r3, ip, lr}

.pushsection .rodata, "a"
Expand Down
4 changes: 2 additions & 2 deletions arch/ia64/include/uapi/asm/cmpxchg.h
Expand Up @@ -139,9 +139,9 @@ extern long ia64_cmpxchg_called_with_bad_pointer(void);
do { \
if (_cmpxchg_bugcheck_count-- <= 0) { \
void *ip; \
extern int printk(const char *fmt, ...); \
extern int _printk(const char *fmt, ...); \
ip = (void *) ia64_getreg(_IA64_REG_IP); \
printk("CMPXCHG_BUGCHECK: stuck at %p on word %p\n", ip, (v));\
_printk("CMPXCHG_BUGCHECK: stuck at %p on word %p\n", ip, (v));\
break; \
} \
} while (0)
Expand Down
6 changes: 3 additions & 3 deletions arch/openrisc/kernel/entry.S
Expand Up @@ -551,7 +551,7 @@ EXCEPTION_ENTRY(_external_irq_handler)
l.movhi r3,hi(42f)
l.ori r3,r3,lo(42f)
l.sw 0x0(r1),r3
l.jal printk
l.jal _printk
l.sw 0x4(r1),r4
l.addi r1,r1,0x8

Expand Down Expand Up @@ -681,8 +681,8 @@ _syscall_debug:
l.sw -4(r1),r27
l.sw -8(r1),r11
l.addi r1,r1,-8
l.movhi r27,hi(printk)
l.ori r27,r27,lo(printk)
l.movhi r27,hi(_printk)
l.ori r27,r27,lo(_printk)
l.jalr r27
l.nop
l.addi r1,r1,8
Expand Down
2 changes: 1 addition & 1 deletion arch/powerpc/kernel/head_fsl_booke.S
Expand Up @@ -852,7 +852,7 @@ KernelSPE:
ori r3,r3,87f@l
mr r4,r2 /* current */
lwz r5,_NIP(r1)
bl printk
bl _printk
#endif
b ret_from_except
#ifdef CONFIG_PRINTK
Expand Down
3 changes: 2 additions & 1 deletion arch/um/include/shared/user.h
Expand Up @@ -38,7 +38,8 @@ extern void panic(const char *fmt, ...)
#define UM_KERN_CONT KERN_CONT

#ifdef UML_CONFIG_PRINTK
extern int printk(const char *fmt, ...)
#define printk(...) _printk(__VA_ARGS__)
extern int _printk(const char *fmt, ...)
__attribute__ ((format (printf, 1, 2)));
#else
static inline int printk(const char *fmt, ...)
Expand Down
2 changes: 1 addition & 1 deletion arch/x86/kernel/head_32.S
Expand Up @@ -446,7 +446,7 @@ SYM_FUNC_START(early_ignore_irq)
pushl 32(%esp)
pushl 40(%esp)
pushl $int_msg
call printk
call _printk

call dump_stack

Expand Down
13 changes: 13 additions & 0 deletions include/asm-generic/vmlinux.lds.h
Expand Up @@ -306,6 +306,17 @@
#define ACPI_PROBE_TABLE(name)
#endif

#ifdef CONFIG_PRINTK_ENUMERATION
#define PRINTK_FMTS \
.printk_fmts : AT(ADDR(.printk_fmts) - LOAD_OFFSET) { \
__start_printk_fmts = .; \
*(.printk_fmts) \
__stop_printk_fmts = .; \
}
#else
#define PRINTK_FMTS
#endif

#ifdef CONFIG_THERMAL
#define THERMAL_TABLE(name) \
. = ALIGN(8); \
Expand Down Expand Up @@ -467,6 +478,8 @@
\
TRACEDATA \
\
PRINTK_FMTS \
\
/* Kernel symbol table: Normal symbols */ \
__ksymtab : AT(ADDR(__ksymtab) - LOAD_OFFSET) { \
__start___ksymtab = .; \
Expand Down
5 changes: 5 additions & 0 deletions include/linux/module.h
Expand Up @@ -499,6 +499,11 @@ struct module {
struct klp_modinfo *klp_info;
#endif

#ifdef CONFIG_PRINTK_ENUMERATION
unsigned int printk_fmts_sec_size;
const char **printk_fmts_start;
#endif

#ifdef CONFIG_MODULE_UNLOAD
/* What modules depend on me? */
struct list_head source_list;
Expand Down
43 changes: 39 additions & 4 deletions include/linux/printk.h
Expand Up @@ -173,12 +173,12 @@ asmlinkage __printf(1, 0)
int vprintk(const char *fmt, va_list args);

asmlinkage __printf(1, 2) __cold
int printk(const char *fmt, ...);
int _printk(const char *fmt, ...);

/*
* Special printk facility for scheduler/timekeeping use only, _DO_NOT_USE_ !
*/
__printf(1, 2) __cold int printk_deferred(const char *fmt, ...);
__printf(1, 2) __cold int _printk_deferred(const char *fmt, ...);

/*
* Please don't use printk_ratelimit(), because it shares ratelimiting state
Expand Down Expand Up @@ -216,12 +216,12 @@ int vprintk(const char *s, va_list args)
return 0;
}
static inline __printf(1, 2) __cold
int printk(const char *s, ...)
int _printk(const char *s, ...)
{
return 0;
}
static inline __printf(1, 2) __cold
int printk_deferred(const char *s, ...)
int _printk_deferred(const char *s, ...)
{
return 0;
}
Expand Down Expand Up @@ -284,6 +284,11 @@ static inline void printk_safe_flush_on_panic(void)

extern int kptr_restrict;

#ifdef CONFIG_PRINTK_ENUMERATION
extern const char *__start_printk_fmts[];
extern const char *__stop_printk_fmts[];
#endif

/**
* pr_fmt - used by the pr_*() macros to generate the printk format string
* @fmt: format string passed from a pr_*() macro
Expand All @@ -301,6 +306,36 @@ extern int kptr_restrict;
#define pr_fmt(fmt) fmt
#endif

#ifdef CONFIG_PRINTK_ENUMERATION
#define printk_store_fmt(func, fmt, ...) \
({ \
int _printk_ret; \
\
if (__builtin_constant_p(fmt)) { \
/*
* The compiler may not be able to eliminate this, so
* we need to make sure that it doesn't see any
* hypothetical assignment for non-constants even
* though this is already inside the
* __builtin_constant_p guard.
*/ \
static const char *_fmt __section(".printk_fmts") = \
__builtin_constant_p(fmt) ? fmt : NULL; \
_printk_ret = func(_fmt, ##__VA_ARGS__); \
} else \
_printk_ret = func(fmt, ##__VA_ARGS__); \
\
_printk_ret; \
})

#define printk(fmt, ...) printk_store_fmt(_printk, fmt, ##__VA_ARGS__)
#define printk_deferred(fmt, ...) \
printk_store_fmt(_printk_deferred, fmt, ##__VA_ARGS__)
#else /* !CONFIG_PRINTK_ENUMERATION */
#define printk(...) _printk(__VA_ARGS__)
#define printk_deferred(...) _printk_deferred(__VA_ARGS__)
#endif /* CONFIG_PRINTK_ENUMERATION */

/**
* pr_emerg - Print an emergency-level message
* @fmt: format string
Expand Down
14 changes: 14 additions & 0 deletions init/Kconfig
Expand Up @@ -764,6 +764,20 @@ config PRINTK_SAFE_LOG_BUF_SHIFT
13 => 8 KB for each CPU
12 => 4 KB for each CPU

config PRINTK_ENUMERATION
bool "Printk enumeration debugfs interface"
depends on PRINTK && DEBUG_FS
help
Add support for enumeration of all printk formats known at compile
time at <debugfs>/printk/formats/<module>.

This can be used as part of maintaining daemons which monitor
/dev/kmsg, as it permits auditing the printk formats present in a
kernel, allowing monitoring of cases where monitored printks are
changed or no longer present.

There is no additional runtime cost to printk with this enabled.

#
# Architectures with an unreliable sched_clock() should select this:
#
Expand Down
5 changes: 5 additions & 0 deletions kernel/module.c
Expand Up @@ -3320,6 +3320,11 @@ static int find_module_sections(struct module *mod, struct load_info *info)
sizeof(unsigned long),
&mod->num_kprobe_blacklist);
#endif
#ifdef CONFIG_PRINTK_ENUMERATION
mod->printk_fmts_start = section_objs(info, ".printk_fmts",
sizeof(*mod->printk_fmts_start),
&mod->printk_fmts_sec_size);
#endif
#ifdef CONFIG_HAVE_STATIC_CALL_INLINE
mod->static_call_sites = section_objs(info, ".static_call_sites",
sizeof(*mod->static_call_sites),
Expand Down

0 comments on commit bff4c8b

Please sign in to comment.