lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000001d6a7a0$18c86300$4a592900$@samsung.com>
Date:   Wed, 21 Oct 2020 20:48:30 +0900
From:   ±èâ±â <changki.kim@...sung.com>
To:     "'Petr Mladek'" <pmladek@...e.com>,
        "'Sergey Senozhatsky'" <sergey.senozhatsky@...il.com>,
        "'Steven Rostedt'" <rostedt@...dmis.org>,
        "'John Ogness'" <john.ogness@...utronix.de>
Cc:     "'Linus Torvalds'" <torvalds@...ux-foundation.org>,
        "'Thomas Gleixner'" <tglx@...utronix.de>,
        "'Prarit Bhargava'" <prarit@...hat.com>,
        "'Mark Salyzyn'" <salyzyn@...roid.com>,
        "'Chunyan Zhang'" <zhang.lyra@...il.com>,
        "'Orson Zhai'" <orsonzhai@...il.com>,
        "'Sergey Senozhatsky'" <sergey.senozhatsky.work@...il.com>,
        <linux-kernel@...r.kernel.org>
Subject: RE: [RFC 2/2] printk: Add more information about the printk caller

> +static size_t info_print_caller_id(char *buf, size_t size,
> +				   const struct printk_caller *caller) {
> +	enum printk_caller_ctx ctx;
> +
> +	ctx = printk_to_caller_ctx(caller->cpu_ctx);
> +
> +	if (ctx == printk_ctx_task)
> +		return snprintf(buf, size, "T%u", caller->pid);
> +
> +	return snprintf(buf, size, "C%u",
> +printk_to_caller_cpu(caller->cpu_ctx));
> +}
> +

When I apply and test this patch, there is no change of print format
compared with previous PRINTK_CALLER.
The patch that I made is always to print the CPU ID and process name
together.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ